Inne

Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II

Imran Bashir

Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci

Nadean H. Tanner

Building a Cyber Resilient Business. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran

Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board

Matthew Poole

Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar, Sandeep Patil

Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition

Kevin Cardwell

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration

Vladimir Yakovlev, Dameon D. Welch

Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans

Shinesa Cambric, Michael Ratemo

Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime

Nearchos Nearchou

CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition

Glen D. Singh

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

Chris Gill, Shannon Kuehn

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego

Marian Kowalewski, Marek Jakubiak

Cybersecurity Research, Education and Management: University Perspective

Andrzej Kraśniewski