Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda

Brenn Hill, Samanyu Chopra, Paul Valencourt, Narayan Prusty

Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar

Ishan Roy

Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer

Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, ...

Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications

Peter Lipovyanov

Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business

Romain Tormen

Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features

Narayan Prusty

Blockchain. Podstawy technologii łańcucha bloków w 25 krokach

Daniel Drescher

Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV

Imran Bashir

Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone

Lorne Lantz, Daniel Cawrey

Blockchain Quick Reference. A guide to exploring decentralized blockchain application development

Brenn Hill, Samanyu Chopra, Paul Valencourt

Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków

William Mougayar, Vitalik Buterin

Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition

Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, ...

Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II

Imran Bashir

Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci

Nadean H. Tanner

Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

Francisco Javier Santiago Vázquez

Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs

Carlos A. Lozano, Shahmeer Amir

Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming

Aniruddha Loya

Building a Cyber Resilient Business. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran

Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board

Matthew Poole

Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar, Sandeep Patil

Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP

Joshua Arvin Lat

Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain

Samuel Zhou

Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure

Sherwin John C. Tragura