Bezpieczeństwo systemów
Richard Diver, Gary Bushey, John Perkins
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
Światowiak Jacek
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
Oleg Afonin, Vladimir Katalov
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek
Mroczne odmęty phishingu. Nie daj się złowić!
Christopher Hadnagy, Michele Fincher, Robin Dreeke (Foreword)
Peter Rising, Nate Chamberlain
Arun Narayanan, Praseed Pai, Shine Xavier
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
Jesse Liberty, Rodrigo Juarez, Maddy Montaquila (Leger)
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
Manuj Aggarwal
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
Gunnar Liljas, Alexander Zaytsev, Jason Dentler
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
Adolfo Eloy Nascimento
Mantavya Gajjar
Rejah Rehim, Manindar Mohan, Grant Ongers
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
Jan Just Keijser
Kyle Wilhoit, Joseph Opacki