Bezpieczeństwo systemów
Richard Diver, Gary Bushey, John Perkins
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
Światowiak Jacek
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
Oleg Afonin, Vladimir Katalov
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek
Mroczne odmęty phishingu. Nie daj się złowić!
Christopher Hadnagy, Michele Fincher, Robin Dreeke (Foreword)
Peter Rising, Nate Chamberlain
Arun Narayanan, Praseed Pai, Shine Xavier
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
Jesse Liberty, Rodrigo Juarez, Maddy Montaquila (Leger)
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
Manuj Aggarwal
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
Gunnar Liljas, Alexander Zaytsev, Jason Dentler
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison