Bezpieczeństwo sieci

Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji

Kunal Sehgal, Nikolaos Thymianis

Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne

Paul Troncone, Carl Albing Ph. D.

CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska

Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw

Miron Lakomy

Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization

Kunal Sehgal, Nikolaos Thymianis

Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career

Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, ...

Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

Dr. Erdal Ozkaya, Melih Abdulhayoglu

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity

Dr. Erdal Ozkaya

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio

Parth Pandit, Robert Hardt

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition

Shiva V. N. Parasram

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker Networking Cookbook. Click here to enter text

Jon Langemak

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim

Electron Projects. Build over 9 cross-platform desktop applications from scratch

Denys Vuika

Ethernet. Biblia administratora

Charles E. Spurgeon, Joann Zimmerman

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker

Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations

Fabrizio Volpe, Rosato Fabbri

Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript

Prateek Jadhwani