Network security

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls

Tom Piens aka 'reaper'

Security Automation with Python. Practical Python solutions for automating and scaling security operations

Corey Charles Sr., Frank McMahon

Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco

Adam Józefiok

Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Rajneesh Gupta, Santiago Bassett

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam

Mike Chapple

SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features

Sven Vermeulen

Sieci VPN. Zdalna praca i bezpieczeństwo danych

Marek Serafin

Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone

Marek Serafin

Sieci Zero Trust. Budowanie bezpiecznych systemów w niezaufanym środowisku. Wydanie II

Razi Rais, Christina Morillo, Evan Gilman, Doug Barth

Skanowanie sieci z Kali Linux. Receptury

Justin Hutchens

SnowPro Core Certification Study Guide. Build a solid foundation in Snowflake to pass the SnowPro Core exam on the first attempt

Jatin Verma

SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM

Joe Dissmeyer, Joseph Dissmeyer

Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce

Johann Rehberger

System bezpieczeństwa w cyberprzestrzeni RP

Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska

Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym

Dan Borges

Techniki twórców złośliwego oprogramowania. Elementarz programisty

Dawid Farbaniec

TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS

Sylwia Gliwa

Testy penetracyjne środowiska Active Directory i infrastruktury opartej na systemie Windows

Denis Isakov

The Art of Cyber Security. A practical guide to winning the war on cyber crime

IT Governance Publishing, Gary Hibberd

The California Privacy Rights Act (CPRA). An implementation and compliance guide

IT Governance Publishing, Preston Bukaty

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder

The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini