System security

Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization

Kunal Sehgal, Nikolaos Thymianis

Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career

Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, ...

Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques

Milad Aslaner

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity

Dr. Erdal Ozkaya

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane

Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java

Kamalmeet Singh, Adrian Ianculescu, Lucian-Paul Torje

DevOps Bootcamp. The fastest way to learn DevOps

Mitesh Soni

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

Digital Forensics and Incident Response. A practical guide to deploying digital forensic techniques in response to cyber security incidents

Gerard Johansen

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jarosław Krochmalski