Hacking
Reverse Engineering Armv8-A Systems. A practical guide to kernel, firmware, and TrustZone analysis
Austin Kim, Bojun Seo
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
Douglas W. Hubbard, Richard Seiersen
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott...
IT Governance Publishing, Lee Newcombe
Jalal Bouhdada, Marco Ayala
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
Sairam Jetty, Sagar Rahalkar