Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Identity Attack Vectors

Identity Attack Vectors

Morey J. Haber & Darran Rolls

Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Nihad A. Hassan & Rami Hijazi

Adversary Emulation with MITRE ATT&CK

Adversary Emulation with MITRE ATT&CK

Drinor Selmanaj

Building Multi-Tenant SaaS Architectures

Building Multi-Tenant SaaS Architectures

Tod Golding

File format: PDF

Security and Microservice Architecture on AWS

Security and Microservice Architecture on AWS

Gaurav Raje

Zero Trust Networks

Zero Trust Networks

Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth

Cloud Native Security Cookbook

Cloud Native Security Cookbook

Josh Armitage

  • « Previous
  • 1
  • 2
  • Book Details

    ...