Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis

ANISH NATH

Packet Tracer for young advanced admins

Jerzy Kluczewski

Packet Tracer for young beginning admins

Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek

Packet Tracer for young intermediate admins

Damian Strojek, Jerzy Kluczewski

Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition

Matt Harrison, Theodore Petrou

Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise

Daniel W. Dieterle

Penetration Testing: A Survival Guide. A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, ...

Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

David Okeyode, Karl Fosaaen, Charles Horton

Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques

Jason Beltrame

Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox

Stefan Umit Uygur

Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition

Michael McPhee, Jason Beltrame

Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

Joseph Muniz, Joseph Muniz, Aamir Lakhani

Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools

Keith Harald Esrick Makan

Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs

Maurício Harley

Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes

Paul Smith

Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition

Bayo Erinle

pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition

David Zientara

PHP, MySQL i JavaScript. Wprowadzenie. Wydanie V

Robin Nixon

Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide

Phara McLachlan

Podstawy kryptografii. Wydanie III

Marcin Karbowski

Podstawy ochrony komputerów

G T Gangemi, Rick Lehtinen, Deborah Russell

PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers

Miriam C. Wiesner, Tanya Janca

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms

Dr. Andrew Blyth, Campbell Murray

Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies

Ganesh Prasad Kumble, Anantha Krishnan