Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls

Tom Piens aka 'reaper'

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA

Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco

Adam Józefiok

Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Rajneesh Gupta, Santiago Bassett

Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic, Nicholas Dicola

Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications

Weimin Sun, Xun (Brian) Wu, Angela Kwok

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam

Mike Chapple

Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG

Carl Cocchiaro

Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3

Pinakin Chaubal

SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features

Sven Vermeulen

Serverless computing in Azure with .NET. Build, test, and automate deployment

Sasha Rosenbaum

Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

Brian Zambrano

Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS

Heartin Kanikathottu

Sieci VPN. Zdalna praca i bezpieczeństwo danych

Marek Serafin

Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone

Marek Serafin

Skanowanie sieci z Kali Linux. Receptury

Justin Hutchens

Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer

Jordan Hudgens

SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki

Waldemar Kitler, Patryk Dobrzycki

Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II

Christopher Hadnagy

Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts

Joseph Ingeno

Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python

Anand Balachandran Pillai