Bezpieczeństwo sieci

Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Yoram Orzach, Deepanshu Khanna

Network Scanning Cookbook. Practical network security using Nmap and Nessus 7

Sairam Jetty

Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats

Aditya Mukherjee

Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks

David Shaw

Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition

Paulino Calderon

Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition

Paulino Calderon

Ocena bezpieczeństwa sieci wyd. 3

Chris McNab

Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide

Ankush Chowdhary, Prashant Kulkarni, Phil Venables

OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial

Fabio Alessandro Locati, Fabio A Locati (Duplicate)

OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense

Julio Cesar Bueno de Camargo

Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis

ANISH NATH

Packet Tracer for young advanced admins

Jerzy Kluczewski

Packet Tracer for young beginning admins

Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek

Packet Tracer for young intermediate admins

Damian Strojek, Jerzy Kluczewski

Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition

Matt Harrison, Theodore Petrou

Penetration Testing: A Survival Guide. A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, ...

Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques

Jason Beltrame

Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition

Michael McPhee, Jason Beltrame

pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition

David Zientara

Podstawy ochrony komputerów

G T Gangemi, Rick Lehtinen, Deborah Russell

Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries

Sravani Bhattacharjee

Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition

Davide Bedin, Mark Russinovich