Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more

Ranga Rao Karanam

Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts

Paulino Calderon

Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology

Chris Childerhose

Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition

Chris Childerhose

Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition

Chris Childerhose

Mastering Vim. Build a software development environment with Vim and Neovim

Ruslan Osipov

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition

Mark Dunkerley, Matt Tumbarello

Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats

Andrew Crouthamel

Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337

Charit Mishra, Piyush Verma

Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition

Sagar Rahalkar

Metasploit Bootcamp. The fastest way to learn Metasploit

Nipun Jaswal

Metasploit for Beginners. Create a threat-free environment with the best-in-class tool

Sagar Rahalkar

Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition

Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks

Sagar Rahalkar, Nipun Jaswal

Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices

Vinicius Feitosa Pacheco

Microsoft 365 Administration Cookbook. Boost efficiency, automate processes, and enforce compliance with expert admin recipes - Second Edition

Nate Chamberlain, Karuana Gatimu

Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt

Aaron Guilmette

Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365

Nate Chamberlain

Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudovic

Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services

Roberto Freato, Brent C Samodien

Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam

David Okeyode