Informatyka

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

Cucumber Cookbook. Over 35 hands-on recipes to efficiently master the art of behaviour-driven development using Cucumber-JVM

Shankar Garg

Customizing and Extending SharePoint Online. Design tailor-made solutions with modern SharePoint features to meet your organization's unique needs

Matti Paukkonen

Customizing ASP.NET Core 5.0. Turn the right screws in ASP.NET Core to get the most out of the framework

Jürgen Gutsch, Damien Bowden

Customizing ASP.NET Core 6.0. Learn to turn the right screws to optimize ASP.NET Core applications for better performance - Second Edition

Jürgen Gutsch, Damien Bowden, Ed Price

Customizing Microsoft Teams. Build custom apps and extensions for your business using Power Platform and Dataverse in Microsoft Teams

Gopi Kondameda

Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe

Shira Rubinoff

Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Dr. Chase Cunningham, Gregory J. Touhill

Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III

Yuri Diogenes, Dr. Erdal Ozkaya

Cyberbezpieczeństwo dla bystrzaków. Wydanie II

Joseph Steinberg

Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze

Cesar Bravo

Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji

Kunal Sehgal, Nikolaos Thymianis

Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne

Paul Troncone, Carl Albing Ph. D.

CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska

Cyberkolonializm. Poznaj świat cyfrowych przyjaciół i wrogów

Krzysztof Gawkowski

CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego

Marian Kowalewski, Marek Jakubiak

Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw

Miron Lakomy

Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity. A Self-Teaching Introduction

Mercury Learning and Information, C. P. Gupta, K. K. Goyal

Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture

Lester Nichols

Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage

Johann Rehberger