Bezpieczeństwo systemów

TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js

Parth Ghiya

Ukryta tożsamość. Jak się obronić przed utratą prywatności

Tomasz Ciborski

Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer

Max Kanat-Alexander

Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4

Jessica Plowman

Unveiling NIST Cybersecurity Framework 2.0. Secure your organization with the practical applications of CSF

Jason Brown

Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization

Thomas Marsland, Jaclyn "Jax" Scott

User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams

Peter W. Szabo

VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere

Bayu Wibowo, Tony Sangha

Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności

Matthew Hickey, Jennifer Arcuri

Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version

Richard Diver, Manuel Singer, Jeff Stokes

Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools

Scar de Courcier, Oleg Skulkin

Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

Victor Marak

Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender

Marius Sandbu

Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016

Jordan Krause

Wireshark 2 Quick Start Guide. Secure your network through protocol analysis

Charit Mishra

Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację

Dr. Chase Cunningham

Zagrożenia cyberbezpieczeństwa i rozwój złośliwego oprogramowania. Poznaj strategie obrony przed współczesnymi niebezpieczeństwami. Wydanie II

Tim Rains

Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV

Steve Suehring

Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs

Ryan Soper, Nestor N Torres, Ahmed Almoailu

Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

Ravi Devarasetty