System security

Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents

Dr. Erdal Ozkaya

Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them

Oleg Skulkin

Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting

Roberto Martinez

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III

Gerard Johansen

Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II

Darren R. Hayes

Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques

Fernando Mayoral

Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń

Megan Roddie, Jason Deyalsingh, Gary J. Katz

Inżynieria odwrotna w praktyce. Narzędzia i techniki

Alexandre Gazet, Sébastien Josse, Elias Bachaalany, Bruce Dang

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification

Shobhit Mehta, Vikas Yadav

IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing

Lewis Heuermann