Systemsicherheit

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Patrick Li

Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide

Chris Davenport, Tom Canavan

Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions

Himanshu Sharma

Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition

Himanshu Sharma

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition

Wolf Halton, Bo Weaver

Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II

Vivek Ramachandran, Cameron Buchanan

Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments

Dhruv Shah, Ishan Girdhar

Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition

Michael Hixon, Justin Hutchens

Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie

Ric Messier

Kali Linux. Testy penetracyjne. Wydanie II

Juned Ahmed Ansari

Kali Linux. Testy penetracyjne. Wydanie III

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition

Cameron Buchanan, Vivek Ramachandran

Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Sean-Philip Oriyano

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova

Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie

Liz Rice

Kotlin Quick Start Guide. Core features to get you ready for developing applications

Marko Devcic

Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers

Joseph Heck

Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam

Krzysztof Godzisz

Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps

Mike van Drongelen, Aravind Krishnaswamy

Lean Product Management. Successful products from fuzzy business ideas

Mangalam Nandakumar

Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition

Kamil Mrzygłód

Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition

William Oettinger

Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing

Zaid Sabih