Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques

Rajvardhan Oak

125 sposobów na bezpieczeństwo sieci. Wydanie II

Andrew Lockhart

A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program

Debra Baker, Ray Rothrock

Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and

Florian Rommel

Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions

Imran Bashir, Narayan Prusty

Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers

Chiheb Chebbi

Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3

Dr Anil Kumar Rangisetti

Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition

Lee Allen, Kevin Cardwell

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and

Lee Allen

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Agile Security Operations. Engineering for agility in cyber defense, detection, and response

Hinne Hettema

AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora

Sebastian Biedroń

Akka Cookbook. Recipes for concurrent, fast, and reactive applications

Piyush Mishra, Vivek Mishra, Héctor Veiga Ortiz

Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source

Valentina Costa-Gazcón

Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym

Massimo Bertaccini

Algorytmy kryptograficzne w Pythonie. Wprowadzenie

Shannon W. Bray

Alicja i Bob. Bezpieczeństwo aplikacji w praktyce

Tanya Janca

Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security

Rebecca Blair

Amazon Web Services w akcji. Wydanie II

Andreas Wittig, Michael Wittig

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Analiza śledcza urządzeń mobilnych. Teoria i praktyka

Aleksandra Boniewicz

Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments

Pragati Rai

Android. Podręcznik hackera

Stephen A. Ridley, Georg Wicherski, Pau Oliva Fora, Collin Mulliner, ...