Безпека мережі

System bezpieczeństwa w cyberprzestrzeni RP

Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska

Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym

Dan Borges

Techniki twórców złośliwego oprogramowania. Elementarz programisty

Dawid Farbaniec

TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS

Sylwia Gliwa

Testy penetracyjne środowiska Active Directory i infrastruktury opartej na systemie Windows

Denis Isakov

The Art of Cyber Security. A practical guide to winning the war on cyber crime

IT Governance Publishing, Gary Hibberd

The California Privacy Rights Act (CPRA). An implementation and compliance guide

IT Governance Publishing, Preston Bukaty

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder

The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini

The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks

IT Governance Publishing, Alan Calder

The Security Consultant's Handbook. Essential Strategies for Building and Managing a Security Consulting Business

IT Governance Publishing, Richard Bingley

The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

Benjamin Strout

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Troubleshooting OpenVPN. Click here to enter text

Eric F Crist

TWOJE BEZPIECZEŃSTWO W ŚWIECIE CYBER I AI Część 1 Wprowadzenie 2025

Gołębiowski Dariusz