Bezpieczeństwo systemów
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
David Steadman, Jeff Ingalls
Shabaz Darr, Viktor Hedberg, Simon Binder
Dwayne Natwick, Sonia Cuff
Microsoft Security Copilot. Master strategies for AI-driven cyber defense
Bi Yue Xu, Rod Trent
Richard Diver, Gary Bushey, John Perkins
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
Światowiak Jacek
Abhinav Mishra
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
Oleg Afonin, Vladimir Katalov
Igor Mikhaylov
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek
Mroczne odmęty phishingu. Nie daj się złowić!
Christopher Hadnagy, Michele Fincher, Robin Dreeke (Foreword)
Peter Rising, Nate Chamberlain
Arun Narayanan, Praseed Pai, Shine Xavier
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
Jesse Liberty, Rodrigo Juarez, Maddy Montaquila (Leger)
Aditya Mukherjee
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
Manuj Aggarwal
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
Gunnar Liljas, Alexander Zaytsev, Jason Dentler
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison
Paulino Calderon
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
Adolfo Eloy Nascimento