Bezpieczeństwo systemów

Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them

Oleg Skulkin

Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting

Roberto Martinez

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III

Gerard Johansen

Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II

Darren R. Hayes

Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques

Fernando Mayoral

Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń

Megan Roddie, Jason Deyalsingh, Gary J. Katz

Inżynieria odwrotna w praktyce. Narzędzia i techniki

Alexandre Gazet, Sébastien Josse, Elias Bachaalany, Bruce Dang

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification

Shobhit Mehta, Vikas Yadav

IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing

Lewis Heuermann

Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych

Aleksandra Boniewicz

Jak pozostać anonimowym w sieci

Radosław Sokół

Jak rabuję banki (i inne podobne miejsca)

FC a.k.a. Freakyclown

Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications

Jason Lee

Java Programming for Beginners. Learn the fundamentals of programming with Java

Mark Lassoff

JavaScript Security. Learn JavaScript security to make your web applications more secure

Eugene Liang

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Patrick Li

Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide

Chris Davenport, Tom Canavan

Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions

Himanshu Sharma