Bezpieczeństwo systemów

Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python

Chiheb Chebbi

Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Alexey Kleymenov, Amr Thabet

Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg, Heike Ritter

Mastering Microsoft Defender for Office 365. Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting

Samuel Soto

Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition

Christiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester

Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition

David Zientara

Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues

José Manuel Ortega

Mastering Reverse Engineering. Re-engineer your ethical hacking skills

Reginald Wong

Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more

Ranga Rao Karanam

Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology

Chris Childerhose

Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition

Chris Childerhose

Mastering Vim. Build a software development environment with Vim and Neovim

Ruslan Osipov

Metasploit Bootcamp. The fastest way to learn Metasploit

Nipun Jaswal

Metasploit for Beginners. Create a threat-free environment with the best-in-class tool

Sagar Rahalkar

Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition

Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices

Vinicius Feitosa Pacheco

Microsoft 365 Administration Cookbook. Enhance your Microsoft 365 productivity to manage and optimize its apps and services - Second Edition

Nate Chamberlain, Karuana Gatimu

Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365

Nate Chamberlain

Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudovic

Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services

Roberto Freato, Brent C Samodien

Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam

David Okeyode

Microsoft Cybersecurity Architect Exam Ref SC-100. Ace the SC-100 exam and develop cutting-edge cybersecurity strategies - Second Edition

Dwayne Natwick, Graham Gold, Abu Zobayer