Bezpieczeństwo systemów

Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world

Mark Dunkerley

Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II

Douglas W. Hubbard, Richard Seiersen

Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure

Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA

Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic, Nicholas Dicola

Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications

Weimin Sun, Xun (Brian) Wu, Angela Kwok

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Serverless computing in Azure with .NET. Build, test, and automate deployment

Sasha Rosenbaum

Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

Brian Zambrano

Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS

Heartin Kanikathottu

Skanowanie sieci z Kali Linux. Receptury

Justin Hutchens

Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer

Jordan Hudgens

SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki

Waldemar Kitler, Patryk Dobrzycki

Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts

Joseph Ingeno

Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python

Anand Balachandran Pillai

Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more

Dinesh Rajput

Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition

Mick Knutson, Robert Winch, Peter Mularien

Strategie cyberbezpieczeństwa współczesnego świata

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek

Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce

Johann Rehberger

System bezpieczeństwa w cyberprzestrzeni RP

Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska

Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym

Dan Borges

Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web

Damodar Lohani