Bezpieczeństwo systemów

Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques

Fernando Mayoral

Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń

Megan Roddie, Jason Deyalsingh, Gary J. Katz

Inżynieria odwrotna w praktyce. Narzędzia i techniki

Alexandre Gazet, Sébastien Josse, Elias Bachaalany, Bruce Dang

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification

Shobhit Mehta, Vikas Yadav

IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing

Lewis Heuermann

Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych

Aleksandra Boniewicz

Jak pozostać anonimowym w sieci

Radosław Sokół

Jak rabuję banki (i inne podobne miejsca)

FC a.k.a. Freakyclown

Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications

Java Programming for Beginners. Learn the fundamentals of programming with Java

Mark Lassoff

JavaScript Security. Learn JavaScript security to make your web applications more secure

Eugene Liang

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide

Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions

Himanshu Sharma

Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition

Himanshu Sharma

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition

Wolf Halton, Bo Weaver

Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II

Vivek Ramachandran, Cameron Buchanan

Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments

Dhruv Shah, Ishan Girdhar

Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition

Michael Hixon, Justin Hutchens

Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie

Ric Messier