Inne

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

A. P. David

Instant Citrix Security How-to. A guide to bulletproofing your enterprise environment with the excellent security features in Citrix

Carmel Jacob

Klastry pracy awaryjnej w środowisku Windows. Instalacja, konfiguracja i zarządzanie

Andrzej Szeląg

Krótka historia informatyki

Ryszard Tadeusiewicz

Learning BeagleBone Python Programming. Unleash the potential of BeagleBone using Python

Alexander C Hiam, Alexander Hiam

Learning Embedded Linux Using the Yocto Project. Develop powerful embedded Linux systems with the Yocto Project components

Alexandru Vaduva, Vaduva Jan Alexandru

Mobile DevOps Playbook. A practical guide for delivering high-quality mobile applications like a pro

Moataz Nabil

Najlepsze praktyki w Kubernetes. Jak budować udane aplikacje

Brendan Burns, Eddie Villalba, Dave Strebel, Lachlan Evenson