System security

A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program

Debra Baker, Ray Rothrock

Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers

Chiheb Chebbi

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Agile Security Operations. Engineering for agility in cyber defense, detection, and response

Hinne Hettema

AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora

Sebastian Biedroń

Akka Cookbook. Recipes for concurrent, fast, and reactive applications

Piyush Mishra, Vivek Mishra, Héctor Veiga Ortiz

Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source

Valentina Costa-Gazcón

Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym

Massimo Bertaccini

Alicja i Bob. Bezpieczeństwo aplikacji w praktyce

Tanya Janca

Amazon Web Services w akcji. Wydanie II

Andreas Wittig, Michael Wittig

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Analiza śledcza urządzeń mobilnych. Teoria i praktyka

Aleksandra Boniewicz

Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments

Pragati Rai

Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Nir Yehoshua, Uriel Kosayev