Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure

Sagar Rahalkar

NHibernate 4.x Cookbook. Click here to enter text. - Second Edition

Gunnar Liljas, Alexander Zaytsev, Jason Dentler

Niebieski lis. Polecenia procesorów Arm i inżynieria wsteczna

Maria Markstedter

Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks

David Shaw

Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition

Paulino Calderon

Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition

Paulino Calderon

OAuth 2.0 Cookbook. Protect your web applications using Spring Security

Adolfo Eloy Nascimento

Ocena bezpieczeństwa sieci wyd. 3

Chris McNab

Ochrona danych osobowych w służbach mundurowych

Janusz Becker

Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni

Jakub Kowalewski, Marian Kowalewski

Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it

Mantavya Gajjar

Offensive Security Using Python. A hands-on guide to offensive tactics and threat mitigation using practical strategies

Rejah Rehim, Manindar Mohan, Grant Ongers

Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them

Rishalin Pillay

Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide

Ankush Chowdhary, Prashant Kulkarni, Phil Venables

OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial

Fabio Alessandro Locati, Fabio A Locati (Duplicate)

OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition

Jan Just Keijser

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense

Julio Cesar Bueno de Camargo

Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise

Vivek Acharya, Anand Eswararao Yerrapati, Nimesh Prakash

Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data

Zoran Pavlovic, Maja Veselica

Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis

ANISH NATH

Packet Tracer for young advanced admins

Jerzy Kluczewski