Bezpieczeństwo sieci

Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools

Nipun Jaswal

Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions

Mohamed Waly

Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis

Phil Bramwell

Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems

Furqan Khan

Hands-On Red Team Tactics. A practical guide to mastering Red Team operations

Himanshu Sharma, Harpreet Singh

Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition

Naren Yellavula

Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps

Tony Hsiang-Chih Hsu

Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony

Jean-Georges Valle

Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor

Kyle Rankin

Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Sreekanth Iyer, Dr. Nataraj Nagaratnam

Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware

Eric Siron, Andrew Syrewicze

IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa

IDS and IPS with Snort 3. Get up and running with Snort 3 and discover effective solutions to your security issues

Ashley Thomas

Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure

Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, ...

Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs

Harpreet Singh

Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA

Marco Fanti