Network security

Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych

Aleksandra Boniewicz

Jak pozostać anonimowym w sieci

Radosław Sokół

Jak rabuję banki (i inne podobne miejsca)

FC a.k.a. Freakyclown

JUNOS Automation Cookbook. Automate network devices on Juniper's operating system

Adam Chappell

Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition

Himanshu Sharma

Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition

Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition

Wolf Halton, Bo Weaver

Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II

Vivek Ramachandran, Cameron Buchanan

Kali Linux Cookbook. Effective penetration testing solutions - Second Edition

Corey P. Schultz, Bob Perciaccante

Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes

David De Smet, Willie L

Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments

Dhruv Shah, Ishan Girdhar

Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition

Michael Hixon, Justin Hutchens

Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning

Justin Hutchens, Justin Hutchens

Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie

Ric Messier

Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2

Gilberto Najera-Gutierrez

Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Sean-Philip Oriyano

Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition

Stian Thorgersen, Pedro Igor Silva

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova

Konfiguracja Firewalli CISCO ASA w programie Packet Tracer

Jerzy Kluczewski, Damian Strojek

Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi, Chris Jenkins

Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam

Krzysztof Godzisz

Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems

Richard Diver, Gary Bushey, Jason S. Rader

Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence

William Oettinger