Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen - książki
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Rootkity i Bootkity
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Czytaj Promocja 2za1
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Czytaj Promocja 2za1
PHP, MySQL i JavaScript. Wprowadzenie. Wydanie V
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Czytaj Promocja 2za1
Zastosowania technologii Blockchain
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Czytaj Promocja 2za1
Bezpieczeństwo urządzeń mobilnych. Receptury
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Czytaj Promocja 2za1
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Managing Security with Snort & IDS Tools
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career