Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet

Jason M Slagle, Jason Slagle

Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python

Preston Miller, Chapin Bryce

Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition

Preston Miller, Chapin Bryce

Learning Python Web Penetration Testing. Automate web penetration testing activities using Python

Christian Martorella

Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2

Miroslav Vitula

Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks

Gregory Boyce

Łamanie i zabezpieczanie aplikacji w systemie iOS

Jonathan Zdziarski

Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python

Emmanuel Tsukerman

Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes

John Paul Mueller, Rod Stephens

Malware Analysis Techniques. Tricks for the triage of adversarial software

Dylan Barker

Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity

Zhassulan Zhussupov

Malware Science. A comprehensive guide to detection, analysis, and compliance

Shane Molinari, Jim Packer

Mała księga wielkich szyfrów

Dominik Robakowski

Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition

Andrew Block, Austin Dewey, Rimantas Mocevicius "rimusz"

Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases

Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith

Mastering AWS Security. Create and maintain a secure cloud ecosystem

Albert Anthony

Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition

Laurent Mathieu

Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition

Mustafa Toroman, Tom Janetscheck

Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition

Imran Bashir

Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition

Imran Bashir

Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks

Imran Bashir

Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition

Imran Bashir

Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity

Jitendra Chittoda

Mastering C++ Programming. Modern C++ 17 at your fingertips

Jeganathan Swaminathan