Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks

Sagar Rahalkar, Nipun Jaswal

Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices

Vinicius Feitosa Pacheco

Microsoft 365 Administration Cookbook. Boost efficiency, automate processes, and enforce compliance with expert admin recipes - Second Edition

Nate Chamberlain, Karuana Gatimu

Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt

Aaron Guilmette

Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365

Nate Chamberlain

Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudovic

Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services

Roberto Freato, Brent C Samodien

Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam

David Okeyode

Microsoft Cybersecurity Architect Exam Ref SC-100. Ace the SC-100 exam and develop cutting-edge cybersecurity strategies - Second Edition

Dwayne Natwick, Graham Gold, Abu Zobayer

Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies

Dwayne Natwick, Rod Trent

Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture

Sasha Kranjac

Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level

Paul Huijbregts, Joe Anich, Justen Graves

Microsoft Defender for Identity in Depth. An exhaustive guide to ITDR, breach prevention, and cyberattack response

Pierre Thoor, Matthew Zorich

Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment

Jordan Krause

Microsoft Identity and Access Administrator SC-300 Exam Guide. Pass the SC-300 exam with confidence by using exam-focused resources - Second Edition

Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick

Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

Shabaz Darr, Viktor Hedberg, Simon Binder

Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices

Andrew Taylor

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Dwayne Natwick, Sonia Cuff

Microsoft Security Copilot. Master strategies for AI-driven cyber defense

Bi Yue Xu, Rod Trent

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

Trevor Stuart, Joe Anich