Systemsicherheit

Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption

Massimo Bertaccini

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe

Shira Rubinoff

Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Dr. Chase Cunningham, Gregory J. Touhill

Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III

Yuri Diogenes, Dr. Erdal Ozkaya

Cyberbezpieczeństwo dla bystrzaków. Wydanie II

Joseph Steinberg

Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze

Cesar Bravo

Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji

Kunal Sehgal, Nikolaos Thymianis

Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne

Paul Troncone, Carl Albing Ph. D.

CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska

Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity. A Self-Teaching Introduction

Mercury Learning and Information, C. P. Gupta, K. K. Goyal

Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture

Lester Nichols

Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage

Johann Rehberger