eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Praktyczna analiza plików binarnych
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Inżynieria zabezpieczeń Tom II
-
Internet Rzeczy
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Krótki kurs. Kryptografia
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Cybersecurity Research, Education and Management: University Perspective
-
Podręcznik hardware hackera
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Enterprise Agility. Being Agile in a Changing World
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
Lean Product Management. Successful products from fuzzy business ideas
-
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain
-
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features
-
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue