Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications

Weimin Sun, Xun (Brian) Wu, Angela Kwok

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam

Mike Chapple

Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG

Carl Cocchiaro

Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3

Pinakin Chaubal

SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features

Sven Vermeulen

Serverless computing in Azure with .NET. Build, test, and automate deployment

Sasha Rosenbaum

Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

Brian Zambrano

Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS

Heartin Kanikathottu

Sieci VPN. Zdalna praca i bezpieczeństwo danych

Marek Serafin

Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone

Marek Serafin

Skanowanie sieci z Kali Linux. Receptury

Justin Hutchens

Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer

Jordan Hudgens

SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki

Waldemar Kitler, Patryk Dobrzycki

Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II

Christopher Hadnagy

Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts

Joseph Ingeno

Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python

Anand Balachandran Pillai

SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM

Joe Dissmeyer, Joseph Dissmeyer

Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain

Ritesh Modi

Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more

Dinesh Rajput

Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition

Mick Knutson, Robert Winch, Peter Mularien

Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition

Badr Nasslahsen

Strategie cyberbezpieczeństwa współczesnego świata

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek

Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce

Johann Rehberger