Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python

Arjuna Sky Kok

Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer

Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr Novotny, ...

Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws

Joe Marshall

Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data

Samuel Bowne

Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches

Dr. Erdal Ozkaya, Milad Aslaner

Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Rajneesh Gupta

Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it

Sion Retzkin

Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works

Chandra Sekhar Nayak, Rivu Chakraborty

Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin

Alexey Soshin

Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms

Florent Vilmart, Giordano Scalzo, Sergio De Simone

Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3

Saurabh Badhwar

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue

Tamir Dresher, Amir Zuker, Shay Friedman

Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications

Remo H. Jansen

Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions

Maximiliano Santos, Enio Moura

Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem

Soma Halder, Sinan Ozdemir

Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0

Juan Antonio Medina Iglesias

Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools

Nipun Jaswal

Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core

Sean Burns

Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions

Mohamed Waly

Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis

Phil Bramwell

Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

Glen D. Singh, Sean-Philip Oriyano

Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems

Furqan Khan

Hands-On Red Team Tactics. A practical guide to mastering Red Team operations

Himanshu Sharma, Harpreet Singh