Ochrona danych osobowych

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

ISO 27001 Controls. Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing

IT Governance Publishing, Bridget Kenyon

ISO 27001/ISO 27002. A guide to information security management systems

IT Governance Publishing, Alan Calder

Listy kontrolne, procedury i instrukcje ODO

Praca zbiorowa

Microsoft Identity and Access Administrator SC-300 Exam Guide. Pass the SC-300 exam with confidence by using exam-focused resources - Second Edition

Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick

NIST CSF 2.0. Your essential introduction to managing cybersecurity risks

IT Governance Publishing, Andrew Pattison

RODO w sieci - 17 pytań i odpowiedzi dotyczących ochrony danych przetwarzanych cyfrowo

Piotr Glen, Michał Koralewski, Maciej Lipka, Michał Nosowski, ...