Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Building Event-Driven Microservices

Building Event-Driven Microservices

Adam Bellemare

Identity Attack Vectors

Identity Attack Vectors

Morey J. Haber & Darran Rolls

Fundamentals of Software Architecture

Fundamentals of Software Architecture

Mark Richards and Neal Ford

Terraform: Up and Running

Terraform: Up and Running

Yevgeniy Brikman

Category: Computers

Hands-On AWS Penetration Testing with Kali Linux

Hands-On AWS Penetration Testing with Kali Linux

Karl Gilbert & Benjamin Caudill

Microsoft Windows Networking Essentials

Microsoft Windows Networking Essentials

Darril Gibson

Cloud Native Infrastructure

Cloud Native Infrastructure

Justin Garrison & Kris Nova

Realm of Racket: Learn to Program, One Game at a Time!

Realm of Racket: Learn to Program, One Game at a Time!

Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University

The Book of F#: Breaking Free with Managed Functional Programming

The Book of F#: Breaking Free with Managed Functional Programming

Dave Fancher

Deploying to OpenShift

Deploying to OpenShift

Graham Dumpleton

Enterprise Cybersecurity Study Guide

Enterprise Cybersecurity Study Guide

Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam

Cybersecurity – Attack and Defense Strategies

Cybersecurity – Attack and Defense Strategies

Yuri Diogenes & Dr. Erdal Ozkaya

Effective DevOps

Effective DevOps

Jennifer Davis & Ryn Daniels

If Hemingway Wrote JavaScript

If Hemingway Wrote JavaScript

Angus Croll

Cyber Security on Azure

Cyber Security on Azure

Marshall Copeland

Network Security Bible

Network Security Bible

Eric Cole & Ronald L. Krutz & James Conley

Database Reliability Engineering

Database Reliability Engineering

Laine Campbell & Charity Majors

Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

Nmap: Network Exploration and Security Auditing Cookbook - Second ...

Paulino Calderon

Serverless Development on AWS

Serverless Development on AWS

Sheen Brisals & Luke Hedger

Prometheus: Up & Running

Prometheus: Up & Running

Brian Brazil

Hands-On Penetration Testing on Windows

Hands-On Penetration Testing on Windows

Phil Bramwell

Seeking SRE

Seeking SRE

David N. Blank-Edelman

The Site Reliability Workbook

The Site Reliability Workbook

Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne

Practical Cyber Intelligence

Practical Cyber Intelligence

Wilson Bautista

Effective Programming

Effective Programming

Jeff Atwood

Industrial Cybersecurity

Industrial Cybersecurity

Pascal Ackerman

Learning Malware Analysis

Learning Malware Analysis

MONNAPPA K A

  • « Previous
  • 1
  • 2
  • Book Details

    ...