Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business

Romain Tormen

Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features

Narayan Prusty

Blockchain. Podstawy technologii łańcucha bloków w 25 krokach

Daniel Drescher

Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone

Lorne Lantz, Daniel Cawrey

Blockchain Quick Reference. A guide to exploring decentralized blockchain application development

Brenn Hill, Samanyu Chopra, Paul Valencourt

Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków

William Mougayar, Vitalik Buterin

Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition

Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, ...

Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II

Imran Bashir

Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci

Nadean H. Tanner

Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs

Carlos A. Lozano, Shahmeer Amir

Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming

Aniruddha Loya

Building a Cyber Resilient Business. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran

Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board

Matthew Poole

Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar, Sandeep Patil

Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP

Joshua Arvin Lat

Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain

Samuel Zhou

Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure

Sherwin John C.Tragura

Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available

Jalem Raj Rohit

Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications

Cagatay Gurturk

Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually

Kevin Cardwell

Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition

Kevin Cardwell

Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite

Sunny Wear

Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition

Dr. Sunny Wear