Protection of personal data

API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation

Confidence Staveley, Christopher Romeo

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

CISA - Certified Information Systems Auditor Study Guide. Ace the CISA exam with practical examples and over 1000 exam-oriented practice questions - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Ochrona sygnalistów w dokumentacji ODO

Michał Kowalski

RODO w sieci - 17 pytań i odpowiedzi dotyczących ochrony danych przetwarzanych cyfrowo

Piotr Glen, Michał Koralewski, Maciej Lipka, Michał Nosowski, ...

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz