Hacking
IT Governance Publishing, Richard Bingley
IT Governance Publishing, Richard Bingley
IT Governance Publishing, Richard Bingley
IT Governance Publishing, Richard Bingley
IT Governance Publishing, Richard Bingley
Blaine Bateman, Ashish Ranjan Jha, Benjamin Johnston,...
Donald A. Tevault
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
Sean Au, Thomas Power(GBP)
Twoje bezpieczeństwo w świecie cyber i AI 2026 Część 2 Cyberhigiena
Dariusz Gołębiowski
Twoje bezpieczeństwo w świecie cyber i AI 2026 Część 3 Dziecko i Ty
Dariusz Gołębiowski
Twoje bezpieczeństwo w świecie cyber i AI Część 1 Wprowadzenie 2026
Dariusz Gołębiowski
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
Agnieszka E. Taper