System security

The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems

Rod Stephens

The OSINT Handbook. A practical guide to gathering and analyzing online information

Dale Meredith, Greg Shields

The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition

Glen D. Singh

The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition

Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response

Andrew Pease

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena

Dariusz Gołębiowski

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie

Dariusz Gołębiowski

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY

Gołębiowski Dariusz

TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js

Parth Ghiya

Ukryta tożsamość. Jak się obronić przed utratą prywatności

Tomasz Ciborski

Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer

Max Kanat-Alexander

Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4

Jessica Plowman

Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization

Thomas Marsland, Jaclyn "Jax" Scott

User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams

Peter W. Szabo

VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere

Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności

Matthew Hickey, Jennifer Arcuri

Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version

Richard Diver, Manuel Singer, Jeff Stokes

Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools

Scar de Courcier, Oleg Skulkin

Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

Victor Marak

Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender

Marius Sandbu

Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016

Jordan Krause

Wireshark 2 Quick Start Guide. Secure your network through protocol analysis

Charit Mishra

Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację

Dr. Chase Cunningham