Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition

Nicolai Henriksen

Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security

Raghu Boddu, Rod Trent, Sami Lamppu

Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security

Światowiak Jacek

Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps

Abhinav Mishra

Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools

Prashant Verma, Akshay Dixit

Mobile Forensics - Advanced Investigative Strategies. Click here to enter text

Oleg Afonin, Vladimir Katalov

Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools

Igor Mikhaylov

Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje

red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek

Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data

Lisa Bock

Modern Network Observability. A hands-on approach using open source tools such as Telegraf, Prometheus, and Grafana

David Flores, Christian Adell, Josh VanDeraa, Eric Chou, ...

Monitoring i bezpieczeństwo sieci

Chris Fry, Martin Nystrom

Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning

Alan S Wijntje

Mroczne odmęty phishingu. Nie daj się złowić!

Christopher Hadnagy

MS-700 Managing Microsoft Teams Exam Guide. Ace the MS-700 exam and become a Certified Microsoft Teams Administrator - Third Edition

Nate Chamberlain, Peter Rising

MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition

Peter Rising, Nate Chamberlain

.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights

Arun Narayanan, Praseed Pai, Shine Xavier

.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications

Jesse Liberty, Rodrigo Juarez, Maddy Montaquila (Leger)

Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition

Yoram Orzach, Nagendra Kumar Nainar, Yogesh Ramdoss

Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Yoram Orzach, Deepanshu Khanna

Network Scanning Cookbook. Practical network security using Nmap and Nessus 7

Sairam Jetty

Network Security and Cryptography. A Comprehensive Guide to Network Protection and Encryption Techniques

Mercury Learning and Information, Sarhan M. Musa