Ochrona danych osobowych
David J. Gee
Gianluca Tiepolo, Dan Sorensen
Confidence Staveley, Christopher Romeo
Clint Bodungen, Aaron Crow
Hemang Doshi, Javen Khoo Ai Wee
Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles
IT Governance Publishing, Alan Calder
Gourav Nagar, Shreyas Kumar, Rohit Ghai
James Leyte-Vidal
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
Shane Hartman, Ken Dunham
Nikki Robinson, Calvin Nobles, Chris Cochran
IT Governance Publishing, Bridget Kenyon
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
Valentine (Traw) Nachi, Donald A. Tevault
Paul Huijbregts, Ru Campbell, Joe Anich, Justen...
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison
RODO w sieci - 17 pytań i odpowiedzi dotyczących ochrony danych przetwarzanych cyfrowo
Piotr Glen, Michał Koralewski, Maciej Lipka, Michał...
Jalal Bouhdada, Marco Ayala
Bogdan Kireeve, Chas Clawson