Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Graph Databases

Graph Databases

Ian Robinson & Jim Webber & Emil Eifrem

Automate the Boring Stuff with Python: Practical Programming for Total Beginners

Automate the Boring Stuff with Python: Practical Programming ...

Al Sweigart

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons

Carey Parker

Persistence Best Practices for Java Applications

Persistence Best Practices for Java Applications

Otávio Santana & Karina Varela

Books

Adversary Emulation with MITRE ATT&CK

Adversary Emulation with MITRE ATT&CK

Drinor Selmanaj

Hands-On Differential Privacy

Hands-On Differential Privacy

Ethan Cowan & Mayana Pereira & and Michael Shoemate

Learning DevSecOps

Learning DevSecOps

Steve Suehring

Defensive Security Handbook

Defensive Security Handbook

Amanda Berlin & Lee Brotherston & and William F. Reyor III

Policy as Code

Policy as Code

Jimmy Ray

97 Things Every Application Security Professional Should Know

97 Things Every Application Security Professional Should Know

Reet Kaur and Yabing Wang

Security Architecture for Hybrid Cloud

Security Architecture for Hybrid Cloud

Mark Buckwell & Stefaan Van daele & and Carsten Horst

Learning Kali Linux

Learning Kali Linux

Ric Messier

The Developer’s Playbook for Large Language Model Security

The Developer’s Playbook for Large Language Model Security

Steve Wilson

Inside Cyber Warfare

Inside Cyber Warfare

Jeffrey Caruso

Attack Surface Management

Attack Surface Management

Ron Eddings and MJ Kaufmann

Intelligent Continuous Security

Intelligent Continuous Security

Marc Hornbeek

  • « Previous
  • 1
  • 2
  • 3
  • 4
  • Book Details

    ...