Bezpieczeństwo systemów

Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them

Rishalin Pillay

OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition

Jan Just Keijser

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise

Daniel W. Dieterle

Penetration Testing: A Survival Guide. A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, ...

Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques

Jason Beltrame

Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs

Maurício Harley

Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes

Paul Smith

Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition

Bayo Erinle

Podstawy ochrony komputerów

G T Gangemi, Rick Lehtinen, Deborah Russell

PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers

Miriam C. Wiesner, Tanya Janca

Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition

Diana Kelley, Ed Moyle

Practical Hardware Pentesting. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Jean-Georges Valle

Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory

Svetlana Ostrovskaya, Oleg Skulkin

Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus

Ajay Singh Chauhan