Hacking
Rohan Pinto
Colin Domoney, Chris Wysopal, Isabelle Mauny
Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux
Karl Lane
Kamalmeet Singh, Adrian Ianculescu, Lucian-Paul Torje
DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud
David Okeyode, Joylynn Kirui, Scott Hanselman
Parth Pandit, Robert Hardt
Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond
IT Governance Publishing, Dr. Julie E. Mehan
Disaster Recovery and Business Continuity. A quick guide for organisations and business managers
IT Governance Publishing, Thejendra B.S
Mercury Learning and Information, Alexander I. Kheyfits
Jeremiah Ginn, David H. Brown
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
Jaroslaw Krochmalski, Jarosław Krochmalski
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
Earl Waud
Domain-Driven Design in PHP. A Highly Practical Guide
Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas
Efektywne zarządzanie podatnościami na zagrożenia. Jak minimalizować ryzyko w cyfrowym ekosystemie
Chris Hughes, Nikki Robinson