Bezpieczeństwo systemów

Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level

Paul Huijbregts, Joe Anich, Justen Graves

Microsoft Defender for Identity in Depth. An exhaustive guide to ITDR, breach prevention, and cyberattack response

Pierre Thoor, Matthew Zorich

Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

Shabaz Darr, Viktor Hedberg, Simon Binder

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Dwayne Natwick, Sonia Cuff

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

Trevor Stuart, Joe Anich

Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition

Richard Diver, Gary Bushey, John Perkins

Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security

Światowiak Jacek

Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps

Abhinav Mishra

Mobile Forensics - Advanced Investigative Strategies. Click here to enter text

Oleg Afonin, Vladimir Katalov

Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools

Igor Mikhaylov

Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje

red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek

Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data

Lisa Bock

Mroczne odmęty phishingu. Nie daj się złowić!

Christopher Hadnagy

MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition

Peter Rising, Nate Chamberlain

.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights

Arun Narayanan, Praseed Pai, Shine Xavier

.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications

Jesse Liberty, Rodrigo Juarez, Maddy Montaquila (Leger)

Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats

Aditya Mukherjee

Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls

Manuj Aggarwal

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure

Sagar Rahalkar

NHibernate 4.x Cookbook. Click here to enter text. - Second Edition

Gunnar Liljas, Alexander Zaytsev, Jason Dentler

Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition

Paulino Calderon

OAuth 2.0 Cookbook. Protect your web applications using Spring Security

Adolfo Eloy Nascimento

Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it

Mantavya Gajjar

Offensive Security Using Python. A hands-on guide to offensive tactics and threat mitigation using practical strategies

Rejah Rehim, Manindar Mohan, Grant Ongers