Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Privileged Attack Vectors

Privileged Attack Vectors

Morey J. Haber

Open Source Projects - Beyond Code

Open Source Projects - Beyond Code

John Mertic

Hands-On Red Team Tactics

Hands-On Red Team Tactics

Himanshu Sharma

Securing Office 365

Securing Office 365

Matthew Katzer

Category: devops

The Site Reliability Workbook

The Site Reliability Workbook

Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne

Kubernetes: Up and Running

Kubernetes: Up and Running

Kelsey Hightower & Brendan Burns & Joe Beda

Prometheus: Up & Running

Prometheus: Up & Running

Brian Brazil

Cloud Native Infrastructure

Cloud Native Infrastructure

Justin Garrison & Kris Nova

Practical Monitoring

Practical Monitoring

Mike Julian

Seeking SRE

Seeking SRE

David N. Blank-Edelman

Effective DevOps

Effective DevOps

Jennifer Davis & Ryn Daniels

Moving Hadoop to the Cloud

Moving Hadoop to the Cloud

Bill Havanki

Database Reliability Engineering

Database Reliability Engineering

Laine Campbell & Charity Majors

Deploying to OpenShift

Deploying to OpenShift

Graham Dumpleton

Jenkins 2: Up and Running

Jenkins 2: Up and Running

Brent Laster

Book Details

...