-
Broad, J., Bindner, A. Hacking with Kali: practical penetration testing techniques. Waltham, MA: Syngress, 2014. ISBN 978-0-12-407749-2.
-
Diogenes, Y., Ozkaya, E. Cybersecurity ? attack and defense strategies: infrastructure security with Red Team and Blue Team tactics. Birmingham: Packt, 2018. ISBN 978-1-78847-529-7.
-
Forshaw, J. Attacking network protocols: a hacker's guide to capture, analysis, and exploitation. San Francisco: No Starch Press, 2018. ISBN 978-1-59327-750-5.
-
Glenny, M. Temný trh: kyberzloději, kyberpolicisté a vy. Praha: Argo, 2013. Zip (31). ISBN 978-80-7363-522-0.
-
Hoopes, J. Virtualization for Security, Including Sandboxng, Disaster Recovery, High Availability, Forensic Analysis, and Honepotting. SYNGRESS, 2009, ISBN 978-1-59749-305-5.
-
Kolouch, J. CyberCrime. Praha: CZ.NIC, z.s.p.o., 2016. CZ.NIC, 14. publikace. ISBN 978-80-88168-15-7.
-
Lehto, M., Neittaanmäki, P., ed. Cyber security: analytics, technology and automation. Cham: Springer, 2015. Intelligent systems, control and automation: science and engineering, Volume 78. ISBN 978-3-319-18301-5.
-
Maisner, M., Vlachová, B. Zákon o kybernetické bezpečnosti: komentář. Praha: Wolters Kluwer, 2015. Komentáře Wolters Kluwer. ISBN 978-80-7478-817-8.
-
Orebaugh, A. Wireshark a Ethereal: kompletní průvodce analýzou a diagnostikou sítí. Brno: Computer Press, 2008. ISBN 978-80-251-2048-4.
-
Sanders C. Analýza sítí a řešení problémů v programu Wireshark. Computer Press, 2012. ISBN 978-80-251-3718-5.
-
Stallings, W. Cryptography and network security: principles and practice. Seventh edition. Boston: Pearson, 2017. Global edition. ISBN 978-1-292-15858-7.
|