Безпека систем

Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych

Aleksandra Boniewicz

Jak pozostać anonimowym w sieci

Radosław Sokół

Jak rabuję banki (i inne podobne miejsca)

FC a.k.a. Freakyclown

Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications

Jason Lee

Java Programming for Beginners. Learn the fundamentals of programming with Java

Mark Lassoff

JavaScript Security. Learn JavaScript security to make your web applications more secure

Eugene Liang

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Patrick Li

Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide

Chris Davenport, Tom Canavan

Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions

Himanshu Sharma

Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition

Himanshu Sharma

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition

Wolf Halton, Bo Weaver

Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II

Vivek Ramachandran, Cameron Buchanan

Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments

Dhruv Shah, Ishan Girdhar

Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition

Michael Hixon, Justin Hutchens

Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie

Ric Messier