Inne

Podstawy kryptografii. Wydanie III

Marcin Karbowski

PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers

Miriam C. Wiesner, Tanya Janca

Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!

Richard Boddington

Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities

Drew Van Duren, Brian Russell

Practical Linux Security Cookbook. Click here to enter text

Tajinder Kalsi

Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty

Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities

Megan Roddie, Jason Deyalsingh, Gary J. Katz

Practical Windows Forensics. Leverage the power of digital forensics for Windows systems

Ayman Shaaban, Konstantin Sapronov

Raspberry Pi: Amazing Projects from Scratch. Click here to enter text

Ashwin Pajankar, Richard Grimmett, Matthew Poole, Arush Kakkar

Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition

Pablo Iranzo Gómez, Pedro Ibanez Requena, Miguel Pérez Colino, Scott McCarty

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam

Mike Chapple

SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features

Sven Vermeulen

Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II

Christopher Hadnagy

Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition

Badr Nasslahsen

Sztuka podstępu. Łamałem ludzi, nie hasła. Wydanie II

Kevin Mitnick