Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane

Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java

Kamalmeet Singh, Adrian Ianculescu, Lucian-Paul Torje

DevOps Bootcamp. The fastest way to learn DevOps

Mitesh Soni

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio

Parth Pandit, Robert Hardt

Digital Forensics and Incident Response. A practical guide to deploying digital forensic techniques in response to cyber security incidents

Gerard Johansen

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition

Shiva V. N. Parasram

Discrete Mathematics With Cryptographic Applications. A Self-Teaching Guide to Unlocking the Power of Advanced Concepts and Computational Techniques

Mercury Learning and Information, Alexander I. Kheyfits

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jarosław Krochmalski

Docker Deep Dive. Zero to Docker in a single book - Third Edition

Nigel Poulton

Docker Networking Cookbook. Click here to enter text

Jon Langemak

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects

Daniel Cox

Dziecko w sieci

Bartosz Danowski, Alicja Krupińska

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Electron Projects. Build over 9 cross-platform desktop applications from scratch

Denys Vuika