Bezpieczeństwo sieci

Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition

Stian Thorgersen, Pedro Igor Silva

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova

Konfiguracja Firewalli CISCO ASA w programie Packet Tracer

Jerzy Kluczewski, Damian Strojek

Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi, Chris Jenkins

Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam

Krzysztof Godzisz

Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems

Richard Diver, Gary Bushey, Jason S. Rader

Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence

William Oettinger

Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments

Kaizhe Huang, Pranjal Jumde, Loris Degioanni