Inne

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker Deep Dive. Zero to Docker in a single book - Third Edition

Nigel Poulton

Dziecko w sieci

Bartosz Danowski, Alicja Krupińska

Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Aaron Woody

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry