Bezpieczeństwo sieci

Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python

Hussam Khrais

Python Network Programming. Conquer all your networking challenges with the powerful Python language

Abhishek Ratan, Eric Chou, Pradeeban Kathiravelu, Dr. M. O. Faruque Sarker

Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems

Neil Smyth

Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II

Douglas W. Hubbard, Richard Seiersen

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls

Tom Piens aka 'reaper'

Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco

Adam Józefiok

Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Rajneesh Gupta, Santiago Bassett

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam

Mike Chapple

SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features

Sven Vermeulen

Sieci VPN. Zdalna praca i bezpieczeństwo danych

Marek Serafin

Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone

Marek Serafin

Sieci Zero Trust. Budowanie bezpiecznych systemów w niezaufanym środowisku. Wydanie II

Razi Rais, Christina Morillo, Evan Gilman, Doug Barth

Skanowanie sieci z Kali Linux. Receptury

Justin Hutchens

SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM

Joe Dissmeyer, Joseph Dissmeyer

Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce

Johann Rehberger

System bezpieczeństwa w cyberprzestrzeni RP

Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska

Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym

Dan Borges

Techniki twórców złośliwego oprogramowania. Elementarz programisty

Dawid Farbaniec

TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS

Sylwia Gliwa

The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini