Inne

Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Aaron Woody

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

EU General Data Protection Regulation (GDPR). An implementation and compliance guide

IT Governance Publishing, IT Governance Privacy Team

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Mari Galloway, Christophe Foulon, Tia Hopkins

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hacking Android. Click here to enter text

Mohammed A. Imran, Srinivasa Rao Kotipalli

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core

Sean Burns

Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony

Jean-Georges Valle

Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor

Kyle Rankin

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Information Security Risk Management for ISO 27001/ISO 27002. A Practical Guide to Risk, Assessment, and Control Selection Aligned with ISO Standards

IT Governance Publishing, Alan Calder, Steve G Watkins

Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących

William Oettinger

Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących. Wydanie II

William Oettinger

Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III

Shiva V. N. Parasram

Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II

Darren R. Hayes

Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments

Charles S Edge, Timothy D Houston

Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website

Jeffrey Dickey

Internet Rzeczy (IoT). Problemy cyberbezpieczeństwa

Jerzy Krawiec

iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics

Bhanu Birani, Mayank Birani

ISO 27001 Controls. Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing

IT Governance Publishing, Bridget Kenyon