Inne

Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition

Lee Allen, Kevin Cardwell

AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora

Sebastian Biedroń

Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source

Valentina Costa-Gazcón

Algorytmy kryptograficzne w Pythonie. Wprowadzenie

Shannon W. Bray

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments

Pragati Rai

Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan

Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach

Dariusz Nabywaniec