Hacking
Paul Huijbregts, Joe Anich, Justen Graves
Pierre Thoor, Matthew Zorich
Kent Nordstrom, Kent Nordstr?É?íÂ!?m
Aaron Guilmette, James Hardiman, Doug Haven, Dwayne...
Shabaz Darr, Viktor Hedberg, Simon Binder
Dwayne Natwick, Sonia Cuff
Microsoft Security Copilot. Master strategies for AI-driven cyber defense
Bi Yue Xu, Rod Trent
Richard Diver, Gary Bushey, John Perkins
Andrew J Plue, Andrew Plue
Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition
Nicolai Henriksen
Raghu Boddu, Rod Trent, Sami Lamppu
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
Światowiak Jacek
Abhinav Mishra
Prashant Verma, Akshay Dixit
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
Oleg Afonin, Vladimir Katalov
Igor Mikhaylov
Darla Nykamp, Joseph Anderson, Jayasree Nampalli, Mari...
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek
David Flores, Christian Adell, Josh VanDeraa, Eric...