wählen sie eine sprache
Cybersecurity w pytaniach i odpowiedziach
Wojciech Ciemski
Cyberwojna. Metody działania hakerów
Dawid Farbaniec
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
Maxim Lapan
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
Parth Pandit, Robert Hardt
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
Gerard Johansen
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
Shiva V. N. Parasram
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
Jeremiah Ginn
Docker Networking Cookbook. Click here to enter text
Jon Langemak