Безпека мережі

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects

Fabio Roberti, Decio Ferreira

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services

Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III

Shiva V. N. Parasram

Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III

Gerard Johansen