Hacking
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
Neil Smyth
Pablo Iranzo Gómez, Pedro Ibanez Requena, Miguel...
Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
Mark Dunkerley
Reverse Engineering Armv8-A Systems. A practical guide to kernel, firmware, and TrustZone analysis
Austin Kim, Bojun Seo
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott...
IT Governance Publishing, Lee Newcombe
IT Governance Publishing, Lee Newcombe
IT Governance Publishing, Lee Newcombe
Jalal Bouhdada, Marco Ayala
Jalal Bouhdada, Marco Ayala
Jalal Bouhdada, Marco Ayala
Jalal Bouhdada, Marco Ayala
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
Sairam Jetty, Sagar Rahalkar
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
Sairam Jetty, Sagar Rahalkar
Akash Mahajan, MADHU AKULA
Corey Charles Sr., Frank McMahon
Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco
Adam Józefiok
Bogdan Kireeve, Chas Clawson
Bogdan Kireeve, Chas Clawson
Bogdan Kireeve, Chas Clawson
Bogdan Kireeve, Chas Clawson
Bogdan Kireeve, Chas Clawson