Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks

Sagar Rahalkar, Nipun Jaswal

Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices

Vinicius Feitosa Pacheco

Microsoft 365 Administration Cookbook. Enhance your Microsoft 365 productivity to manage and optimize its apps and services - Second Edition

Nate Chamberlain, Karuana Gatimu

Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt

Aaron Guilmette

Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365

Nate Chamberlain

Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudovic