Inne

Jak rabuję banki (i inne podobne miejsca)

FC a.k.a. Freakyclown

Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition

Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV

Vijay Kumar Velu

Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II

Vijay Kumar Velu

Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition

Stian Thorgersen, Pedro Igor Silva

Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie

Liz Rice

Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing

Zaid Sabih

Malware Science. A comprehensive guide to detection, analysis, and compliance

Shane Molinari, Jim Packer

Mała księga wielkich szyfrów

Dominik Robakowski

Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance

Adarsh Nair, Greeshma M. R.

Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux

Brian Sak, Jilumudi Raghu Ram

Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition

Alexey Kleymenov, Amr Thabet

Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition

Nipun Jaswal

Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition

Soufiane Tahiri

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition

Mark Dunkerley, Matt Tumbarello