Bezpieczeństwo systemów

Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience

Rohan Pinto

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane

Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java

Kamalmeet Singh, Adrian Ianculescu, Lucian-Paul Torje

DevOps Bootcamp. The fastest way to learn DevOps

Mitesh Soni