Netzwerksicherheit

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio

Parth Pandit, Robert Hardt

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition

Shiva V. N. Parasram

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker Networking Cookbook. Click here to enter text

Jon Langemak

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim