Bezpieczeństwo systemów

The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology

Paul Flewelling

The Art of Cyber Security. A practical guide to winning the war on cyber crime

IT Governance Publishing, Gary Hibberd

The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior

David J. Gee, Darryl West

The California Privacy Rights Act (CPRA). An implementation and compliance guide

IT Governance Publishing, Preston Bukaty

The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach

Akash Mukherjee, Jason D. Clinton

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder

The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks

Jeremy Wittkop

The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed

Viktor Farcic

The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters

Viktor Farcic

The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale

Viktor Farcic

The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini

The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems

Rod Stephens

The OSINT Handbook. A practical guide to gathering and analyzing online information

Dale Meredith, Greg Shields

The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks

IT Governance Publishing, Alan Calder

The Security Consultant's Handbook. Essential Strategies for Building and Managing a Security Consulting Business

IT Governance Publishing, Richard Bingley

The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition

Glen D. Singh