Bezpieczeństwo systemów

A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program

Debra Baker, Ray Rothrock

Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers

Chiheb Chebbi

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Agile Security Operations. Engineering for agility in cyber defense, detection, and response

Hinne Hettema

AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora

Sebastian Biedroń

Akka Cookbook. Recipes for concurrent, fast, and reactive applications

Piyush Mishra, Vivek Mishra, Héctor Veiga Ortiz

Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source

Valentina Costa-Gazcón

Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym

Massimo Bertaccini

Alicja i Bob. Bezpieczeństwo aplikacji w praktyce

Tanya Janca

Amazon Web Services w akcji. Wydanie II

Andreas Wittig, Michael Wittig

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Analiza śledcza urządzeń mobilnych. Teoria i praktyka

Aleksandra Boniewicz

Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments

Pragati Rai

Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Nir Yehoshua, Uriel Kosayev

API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation

Confidence Staveley, Christopher Romeo

Applied Network Security. Proven tactics to detect and defend against all kinds of network attack

Arthur Salmon, Michael McLafferty, Warun Levesque

Audyt bezpieczeństwa informacji w praktyce

Tomasz Polaczek

Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code

Dennis Chow, David Bruskin

Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles

Dr. Ahmad MK Nasser

AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification

Vipul Tankariya, Bhavin Parmar

AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS

Markus Klems

Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik

Adam Józefiok