Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW

Abd El Monem A Mohamed El Bawab

Unveiling NIST Cybersecurity Framework 2.0. Secure your organization with the practical applications of CSF

Jason Brown

Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization

Thomas Marsland, Jaclyn "Jax" Scott

Upoluj cyberprzestępcę. Przewodnik dla hakerów prowadzących śledztwa online

Vinny Troia

User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams

Peter W. Szabo

VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere

Bayu Wibowo, Tony Sangha

VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud

Prasenjit Sarkar, Prasenjit Sarkar

VMware vSphere ESXi 8. Instalacja, konfiguracja i wprowadzenie do vCenter

Adam Nogły

Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności

Matthew Hickey, Jennifer Arcuri

Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0

Juned Ahmed Ansari, Juned Ahmed Ansari

Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning

Ajay Baranwal, Alizishaan Khatri, Tanish Baranwal

Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version

Richard Diver, Manuel Singer, Jeff Stokes

Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition

Phil Bramwell

Windows APT Warfare. Identify and prevent Windows APT attacks effectively

Sheng-Hao Ma, Ziv Chang, Federico Maggi

Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools

Scar de Courcier, Oleg Skulkin

Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

Victor Marak

Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender

Marius Sandbu

Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016

Jordan Krause

Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition

Bekim Dauti

Wireshark 2 Quick Start Guide. Secure your network through protocol analysis

Charit Mishra

Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively

James H. Baxter, James H Baxter

Wireshark Network Security. A succinct guide to securely administer your network using Wireshark

Piyush Verma