System security

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance

Shane Molinari, Jim Packer

Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience

Rohan Pinto

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane

Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java

Kamalmeet Singh, Adrian Ianculescu, Lucian-Paul Torje

DevOps Bootcamp. The fastest way to learn DevOps

Mitesh Soni

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jarosław Krochmalski

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR

Guven Boyraz