Inne

Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition

Kevin Cardwell

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration

Vladimir Yakovlev, Dameon D. Welch

CISA - Certified Information Systems Auditor Study Guide. Ace the CISA exam with practical examples and over 1000 exam-oriented practice questions - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans

Shinesa Cambric, Michael Ratemo

Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime

Nearchos Nearchou

CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition

Glen D. Singh

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

Chris Gill, Shannon Kuehn

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego

Marian Kowalewski, Marek Jakubiak

Cybersecurity Research, Education and Management: University Perspective

Andrzej Kraśniewski

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Data science od podstaw. Analiza danych w Pythonie

Joel Grus

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker Deep Dive. Zero to Docker in a single book - Third Edition

Nigel Poulton

Dziecko w sieci

Bartosz Danowski, Alicja Krupińska

Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Aaron Woody

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hacking Android. Click here to enter text

Mohammed A. Imran, Srinivasa Rao Kotipalli