Hacking
Megan Roddie, Jason Deyalsingh, Gary J. Katz
Megan Roddie, Jason Deyalsingh, Gary J. Katz
Megan Roddie, Jason Deyalsingh, Gary J. Katz
Inżynieria odwrotna w praktyce. Narzędzia i techniki
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien...
Bhanu Birani, Mayank Birani
Bhanu Birani, Mayank Birani
Gianluca Tiepolo
Gianluca Tiepolo
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
Aaron Guzman, Aditya Gupta
Shobhit Mehta, Vikas Yadav
IT Governance Publishing, Bridget Kenyon
IT Governance Publishing, Bridget Kenyon
IT Governance Publishing, Bridget Kenyon
IT Governance Publishing, Bridget Kenyon
IT Governance Publishing, Bridget Kenyon
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing
Lewis Heuermann
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
Aleksandra Boniewicz
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
Aleksandra Boniewicz
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
Aleksandra Boniewicz
Java Programming for Beginners. Learn the fundamentals of programming with Java
Mark Lassoff
JavaScript Security. Learn JavaScript security to make your web applications more secure
Eugene Liang
Mitesh Soni, Alan Mark Berg