Second book
Together with several other authors, I had the opportunity to co-create the second book in my career, Wprowadzenie do bezpieczeństwa IT (also known as Introduction to IT Security). The book is written in Polish...
Read post
Together with several other authors, I had the opportunity to co-create the second book in my career, Wprowadzenie do bezpieczeństwa IT (also known as Introduction to IT Security). The book is written in Polish...
Read post
Together with the Sekurak.pl team, we released a book titled Bezpieczenstwo aplikacji webowych (book page; PL only), in which I wrote several chapters, including:
Read post
When you maintain many web applications on your server, sooner or later you may encounter a nasty surprise in the form of an unwanted addition to one of them. These additions are, of course,...
Read post
The most popular CMS, thousands of plugins and themes, and millions of users - this is WordPress. The question is whether, alongside the enormous number of features that WordPress offers right after installation, it...
Read post
While reading RFC6749, one may get the impression that it is a document describing general guidelines for building support for OAuth 2.0. This observation is consistent with the title, which includes the word “framework”....
Read post
The development of web applications has made it increasingly necessary to implement solutions that allow asynchronous data exchange between the client and the server. One of the proposed approaches was the use of the...
Read post