Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Building a Cyber Risk Management Program

Building a Cyber Risk Management Program

Brian Allen & Brandon Bapst & and Terry Allan Hicks

The Linux Command Line: A Complete Introduction, 2nd Edition

The Linux Command Line: A Complete Introduction, 2nd Edition

William Shotts

Hands-On Cybersecurity with Blockchain

Hands-On Cybersecurity with Blockchain

Rajneesh Gupta

Metasploit for Beginners

Metasploit for Beginners

Sagar Rahalkar

Category: patterns

Practical Design Patterns
for Java Developers

Practical Design Patterns for Java Developers

Miroslav Wengner

Software Architecture Patterns

Software Architecture Patterns

Mark Richards

Technology Strategy Patterns

Technology Strategy Patterns

Eben Hewitt

Communication Patterns

Communication Patterns

Jacqui Read

Book Details

...