Hacking
Mroczne odmęty phishingu. Nie daj się złowić!
Christopher Hadnagy, Michele Fincher, Robin Dreeke (Foreword)
Nate Chamberlain, Peter Rising
Peter Rising, Nate Chamberlain
Arun Narayanan, Praseed Pai, Shine Xavier
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
Jesse Liberty, Rodrigo Juarez, Maddy Montaquila (Leger)
Yoram Orzach, Nagendra Kumar Nainar, Yogesh Ramdoss
Yoram Orzach, Deepanshu Khanna
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
Sairam Jetty
Mercury Learning and Information, Sarhan M. Musa
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
Manuj Aggarwal
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
Gunnar Liljas, Alexander Zaytsev, Jason Dentler
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison
Paulino Calderon, Gordon Lyon
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
Adolfo Eloy Nascimento