Безпека мережі

Efektywne zarządzanie podatnościami na zagrożenia. Jak minimalizować ryzyko w cyfrowym ekosystemie

Chris Hughes, Nikki Robinson

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim

Electron Projects. Build over 9 cross-platform desktop applications from scratch

Denys Vuika

Empirical Cloud Security. A Guide To Practical Intelligence to Evaluate Risks and Attacks

Mercury Learning and Information, Aditya K. Sood

Ethernet. Biblia administratora

Charles E. Spurgeon, Joann Zimmerman

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Etyczne łamanie haseł. John the Ripper, hashcat i inne zaawansowane techniki

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown