Inne
Jeffrey Dickey
Bhanu Birani, Mayank Birani
IT Governance Publishing, Bridget Kenyon
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel...
Wolf Halton, Bo Weaver
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
Vijay Kumar Velu
Stian Thorgersen, Pedro Igor Silva
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
Zaid Sabih
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
Valentine (Traw) Nachi, Donald A. Tevault
Mastering Endpoint Management using Microsoft Intune Suite. Learn Everything About Intune Suite
Saurabh Sarkar, Rahul Singh, Rudy Ooms, Anoop...
Adarsh Nair, Greeshma M. R.
Brian Sak, Jilumudi Raghu Ram
Alexey Kleymenov, Amr Thabet
Nipun Jaswal
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
Soufiane Tahiri
Mark Dunkerley, Matt Tumbarello
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
Sagar Rahalkar, Nipun Jaswal
Aaron Guilmette