Network security

10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques

Rajvardhan Oak

125 sposobów na bezpieczeństwo sieci. Wydanie II

Andrew Lockhart

Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and

Florian Rommel

Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers

Chiheb Chebbi

Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3

Dr Anil Kumar Rangisetti

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and

Lee Allen

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source

Valentina Costa-Gazcón

Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym

Massimo Bertaccini

Alicja i Bob. Bezpieczeństwo aplikacji w praktyce

Tanya Janca

Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security

Rebecca Blair

Amazon Web Services w akcji. Wydanie II

Andreas Wittig, Michael Wittig

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Analiza śledcza urządzeń mobilnych. Teoria i praktyka

Aleksandra Boniewicz

API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation

Confidence Staveley, Christopher Romeo

API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing

Dave Westerveld

Applied Network Security. Proven tactics to detect and defend against all kinds of network attack

Arthur Salmon, Michael McLafferty, Warun Levesque

Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud

Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz

ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around

Rajesh Gunasundaram

Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation

Simone Onofri, Donato Onofri, Matteo Meucci

Audyt bezpieczeństwa informacji w praktyce

Tomasz Polaczek

AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition

Adam Book, Stuart Scott

AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap

Jonathan Helmus

AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS

Heartin Kanikathottu