System security

Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus

Ajay Singh Chauhan

Practical OneOps. Implement DevOps with ease

Nilesh Nimkar

Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps

Tony Hsiang-Chih Hsu

Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities

Megan Roddie, Jason Deyalsingh, Gary J. Katz

Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools

Valentina Costa-Gazcón

Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more

Gus Khawaja

Prawdziwa głębia OSINT. Odkryj wartość danych Open Source Intelligence

Rae L. Baker

Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów

Martin Kleppmann

Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation

David Routin, Simon Thoores, Samuel Rossier

Python Digital Forensics Cookbook. Effective Python recipes for digital investigations

Chapin Bryce, Preston Miller

Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python

Hussam Khrais

Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation

Rejah Rehim

Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django

Daniel Furtado, Marcus Pennington

QGIS Python Programming Cookbook. Automating geospatial development - Second Edition

Joel Lawhead

Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II

Douglas W. Hubbard, Richard Seiersen

Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure

Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA

Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic, Nicholas Dicola

Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications

Weimin Sun, Xun (Brian) Wu, Angela Kwok

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Serverless computing in Azure with .NET. Build, test, and automate deployment

Sasha Rosenbaum

Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

Brian Zambrano

Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS

Heartin Kanikathottu