Безпека мережі

The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

Benjamin Strout

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Troubleshooting OpenVPN. Click here to enter text

Eric F Crist

Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena

Dariusz Gołębiowski

Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców

Agnieszka E. Taper

Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW

Abd El Monem A Mohamed El Bawab

VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud

Prasenjit Sarkar, Prasenjit Sarkar

VMware vSphere ESXi 8. Instalacja, konfiguracja i wprowadzenie do vCenter

Adam Nogły

Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności

Matthew Hickey, Jennifer Arcuri

Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition

Phil Bramwell

Windows APT Warfare. Identify and prevent Windows APT attacks effectively

Sheng-Hao Ma, Ziv Chang, Federico Maggi

Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively

James H. Baxter, James H Baxter

Wireshark Network Security. A succinct guide to securely administer your network using Wireshark

Piyush Verma

Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively

James H Baxter, Yoram Orzach, Charit Mishra

Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację

Dr. Chase Cunningham

Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool

Rihards Olups, Patrik Uytterhoeven, Andrea Dalle Vacche

Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance

Luciano Alves, Luciano de C Alves

Zagrożenia cyberbezpieczeństwa i rozwój złośliwego oprogramowania. Poznaj strategie obrony przed współczesnymi niebezpieczeństwami. Wydanie II

Tim Rains

Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV

Steve Suehring

Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners

Mark Simos, Nikhil Kumar, Ann Johnson

Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

Ravi Devarasetty