Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

IDS and IPS with Snort 3. Get up and running with Snort 3 and discover effective solutions to your security issues

Ashley Thomas

Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes

Matthew Nohr, Isaac Rabinovitch

Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure

Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, ...

Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs

Harpreet Singh

Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture

Mitesh Soni

Implementing DevSecOps Practices. Understand application security testing and secure coding by integrating SAST and DAST

Vandana Verma Sehgal

Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA

Marco Fanti

Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms

Marius Sandbu