Protection of personal data

API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation

Confidence Staveley, Christopher Romeo

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats

Gourav Nagar, Shreyas Kumar, Rohit Ghai

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Listy kontrolne, procedury i instrukcje ODO

Praca zbiorowa