Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova

Konfiguracja Firewalli CISCO ASA w programie Packet Tracer

Jerzy Kluczewski, Damian Strojek

Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie

Liz Rice

Kotlin Quick Start Guide. Core features to get you ready for developing applications

Marko Devcic

Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers

Joseph Heck

Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi, Chris Jenkins

Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam

Krzysztof Godzisz

Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps

Mike van Drongelen, Aravind Krishnaswamy

Lean Product Management. Successful products from fuzzy business ideas

Mangalam Nandakumar

Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition

Kamil Mrzygłód

Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems

Richard Diver, Gary Bushey, Jason S. Rader

Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications

Kirankalyan Kulkarni

Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence

William Oettinger

Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition

William Oettinger

Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing

Zaid Sabih

Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark

Glen D. Singh

Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments

Kaizhe Huang, Pranjal Jumde, Loris Degioanni

Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem

Mohamed Waly

Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills

Rishalin Pillay

Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions

David Zientara

Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development

Ivo Balbaert

Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert

Dr. Erdal Ozkaya

Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition

Lisa Bock

Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition

Oleg Skulkin, Donnie Tindall, Rohit Tamma