![](https://steemitimages.com/640x0/https://i0.wp.com/www.popculthq.com/wp-content/uploads/2017/02/Humble-Bundle-logo-transparent.png)
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/80b534eb691f234833835f47339eb3ddcfeee67b.png?auto=format&lossless=1&ixlib=python-0.2.0&s=99d591567fbb9ee9e84af1f371aa824d)
Ponownie coś ciekawego w Humble Bundle! Tym razem jest to paczka książek o cyberbezpieczeństwie, ale niestety wszystko w języku angielskim. Każdy ebook dostępny w formacie PDF, a niektóre także w ePUB i MOBI. Całość dostępna na ich stronie.
Przynajmniej $1:
Social Engineering: The Art of Human Hacking
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/3a2f23f401de6c3e8ba12e5de8e1d0bd672fb906.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=f01321649c8da3517cfea483552e1287)
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/6cf5adf210d7d5b571cc3348f455c594b9db1534.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=c99df9409ed6971140d6333489ce66d9)
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/651f97c76fc7b2184a1fae8da9addfa13177bd61.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=6d22b09038251768020eb9761013a525)
Threat Modeling: Designing for Security
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/21eb89724130459b38e50e4a7537351f12e9f3a7.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=3e09da82173c0dc3d8a0835e4f5e1198)
Przynajmniej $8:
Wszystkie powyższe oraz:
Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/2c65e3163afb40bf6d9a44ab4e4369c59c2d9eac.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=ba25d9d9620677d8d99f10e307a07a50)
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/70ff907a75b3989a77cddbfa08e2d64ce7a68f7b.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=30ad533bc5a37ec659d8c6926c736515)
Cryptography Engineering: Design Principles and Practical Applications
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/e264c8c97135740a4ab7decb70618e120f11454f.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=88f2a0f5c696ad26afd589524f3bcd30)
The Art of Deception: Controlling the Human Element of Security
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/5f21c10c52abaf9c90bc5b8f3b20253b1e2fcbef.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=9854b9b976b5f9edfc0add1a8258fd47)
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/3968bed5eed82ca0b3610ce805ef925fa4f503d2.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=9e045b262c2b39f5363bbde080532446)
Przynajmniej $15:
Wszystkie powyższe oraz:
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/6ab8750a0ffe6c3a5419209d59798ba926b7bcdc.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=6814f7e646e7a2c45faddaf9b453cacc)
Unauthorised Access: Physical Penetration Testing For IT Security Teams
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/4625b33fbd895520c5aaac912d3a291430394667.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=21b2c24bf38a2c9cb9e2358db85c3fe9)
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/122a0c690b49b3b08cdbe41cf07aad7e696b5ac1.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=2ab820814b2af45666e973370a1458b1)
CEH v9: Certified Ethical Hacker Version 9 Study Guide
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/155e84e851d806f1ce8a4e059dcba43dae4ab3d0.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=0de71e0b5f1a3bcf17aeb7ebdbc9f2ed)
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
![](https://steemitimages.com/640x0/https://humblebundle.imgix.net/misc/files/hashed/32913a97e3dd5f5140d98e51af9043787fafd8e5.jpg?auto=format&fit=clip&h=240&w=180&ixlib=python-0.2.0&s=15b99abb4da75ff693e0d993aa00e058)
Polecam od siebie:
Bardzo rzeczowe, techniczne książki. Sama praktyczna wiedza. Nie ma lepszych tytułów z inżynierii wstecznej oprogramowania i analizy złośliwego oprogramowania.
Dziwię się, że tak tanio można je dostać. Pare lat temu dawałem ponad $60 za każdą z nich.