Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Electron Projects. Build over 9 cross-platform desktop applications from scratch

Denys Vuika

Empirical Cloud Security. A Guide To Practical Intelligence to Evaluate Risks and Attacks

Mercury Learning and Information, Aditya K. Sood

Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR

Guven Boyraz

Enhancing Your Cloud Security with a CNAPP Solution. Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security

Yuri Diogenes

Enterprise Agility. Being Agile in a Changing World

Sunil Mundra

Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform

Ganesan Senthilvel, Ovais Mehboob Ahmed Khan, Habib Qureshi

Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles

Zeal Vora

Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Aaron Woody

Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser

Alessandro Segala

Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Manoj P R

Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity

Mayukh Mukhopadhyay

Ethernet. Biblia administratora

Charles E. Spurgeon, Joann Zimmerman

Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd

Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula

Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform

Atul Mistry

Exploring Experience Design. Fusing business, tech, and design to shape customer engagement

Ezra Schwartz

Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

William Roberts, William Confer

Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments

Alex Callejas

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker