System security

System bezpieczeństwa w cyberprzestrzeni RP

Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska

Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym

Dan Borges

Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web

Damodar Lohani

Techniki twórców złośliwego oprogramowania. Elementarz programisty

Dawid Farbaniec

Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa

Prakhar Prasad

The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology

Paul Flewelling

The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior

David J. Gee, Darryl West

The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach

Akash Mukherjee, Jason D. Clinton

The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks

Jeremy Wittkop

The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed

Viktor Farcic

The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters

Viktor Farcic

The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale

Viktor Farcic

The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini

The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems

Rod Stephens

The OSINT Handbook. A practical guide to gathering and analyzing online information

Dale Meredith, Greg Shields

The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition

Glen D. Singh

The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition

Glen D. Singh

The Ultimate Linux Shell Scripting Guide. Automate, Optimize, and Empower tasks with Linux Shell Scripting

Donald A. Tevault

Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response

Andrew Pease

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena

Dariusz Gołębiowski

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie

Dariusz Gołębiowski

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY

Gołębiowski Dariusz