Other

Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools

Prashant Verma, Akshay Dixit

Mobile Forensics - Advanced Investigative Strategies. Click here to enter text

Oleg Afonin, Vladimir Katalov

Mroczne odmęty phishingu. Nie daj się złowić!

Christopher Hadnagy

Niebieski lis. Polecenia procesorów Arm i inżynieria wsteczna

Maria Markstedter

NIST CSF 2.0. Your essential introduction to managing cybersecurity risks

IT Governance Publishing, Andrew Pattison

Ochrona danych osobowych w służbach mundurowych

Janusz Becker

Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni

Jakub Kowalewski, Marian Kowalewski

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data

Zoran Pavlovic, Maja Veselica

PCI DSS Version 4.0.1. A guide to the payment card industry data security standard

IT Governance Publishing, Stephen Hancock

Penetration Testing: A Survival Guide. A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, ...

Podstawy kryptografii. Wydanie III

Marcin Karbowski

PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers

Miriam C. Wiesner, Tanya Janca

Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!

Richard Boddington