Bezpieczeństwo systemów
Aditya Mukherjee
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
Manuj Aggarwal
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
Gunnar Liljas, Alexander Zaytsev, Jason Dentler
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison
Paulino Calderon
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
Adolfo Eloy Nascimento
Mantavya Gajjar
Rejah Rehim, Manindar Mohan, Grant Ongers
Rishalin Pillay
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
Jan Just Keijser
Kyle Wilhoit, Joseph Opacki
Palo Alto Networks from Policy to Code. Automate PAN-OS security policies with Python precision
Nikolay Matveev, Migara Ekanayake
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
Daniel W. Dieterle
Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari,...