System security

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification

Shobhit Mehta, Vikas Yadav

IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing

Lewis Heuermann

Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych

Aleksandra Boniewicz

Jak pozostać anonimowym w sieci

Radosław Sokół

Jak rabuję banki (i inne podobne miejsca)

FC a.k.a. Freakyclown

Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications

Jason Lee

Java Programming for Beginners. Learn the fundamentals of programming with Java

Mark Lassoff

JavaScript Security. Learn JavaScript security to make your web applications more secure

Eugene Liang

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Patrick Li

Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide

Chris Davenport, Tom Canavan

Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions

Himanshu Sharma

Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition

Himanshu Sharma

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition

Wolf Halton, Bo Weaver

Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II

Vivek Ramachandran, Cameron Buchanan

Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments

Dhruv Shah, Ishan Girdhar

Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition

Michael Hixon, Justin Hutchens

Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie

Ric Messier

Kali Linux. Testy penetracyjne. Wydanie II

Juned Ahmed Ansari

Kali Linux. Testy penetracyjne. Wydanie III

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition

Cameron Buchanan, Vivek Ramachandran

Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Sean-Philip Oriyano

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova