Hacking
Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
Mark Dunkerley
Reverse Engineering Armv8-A Systems. A practical guide to kernel, firmware, and TrustZone analysis
Austin Kim, Bojun Seo
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott...
IT Governance Publishing, Lee Newcombe
IT Governance Publishing, Lee Newcombe
IT Governance Publishing, Lee Newcombe
Jalal Bouhdada, Marco Ayala
Jalal Bouhdada, Marco Ayala
Jalal Bouhdada, Marco Ayala
Jalal Bouhdada, Marco Ayala
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
Sairam Jetty, Sagar Rahalkar
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
Sairam Jetty, Sagar Rahalkar