Захист персональних даних

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz