Bezpieczeństwo systemów
Palo Alto Networks from Policy to Code. Automate PAN-OS security policies with Python precision
Nikolay Matveev, Migara Ekanayake
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
Daniel W. Dieterle
Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari,...
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
Jason Beltrame
Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs
Maurício Harley
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
Miriam C. Wiesner, Tanya Janca
Diana Kelley, Ed Moyle
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
Svetlana Ostrovskaya, Oleg Skulkin
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish...
Ajay Singh Chauhan
Tony Hsiang-Chih Hsu
Megan Roddie, Jason Deyalsingh, Gary J. Katz
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych
Katharine Jarmul
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
Martin Kleppmann
David Routin, Simon Thoores, Samuel Rossier
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
Chapin Bryce, Preston Miller