Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Hands-On Penetration Testing on Windows

Hands-On Penetration Testing on Windows

Phil Bramwell

Identity Attack Vectors

Identity Attack Vectors

Morey J. Haber & Darran Rolls

Building Multi-Tenant SaaS Architectures

Building Multi-Tenant SaaS Architectures

Tod Golding

Technical Program Manager’s Handbook

Technical Program Manager’s Handbook

Joshua Alan Teter

Language: English

Security Architecture for Hybrid Cloud

Security Architecture for Hybrid Cloud

Mark Buckwell & Stefaan Van daele & and Carsten Horst

Building a Cyber Risk Management Program

Building a Cyber Risk Management Program

Brian Allen & Brandon Bapst & and Terry Allan Hicks

Adversary Emulation with MITRE ATT&CK

Adversary Emulation with MITRE ATT&CK

Drinor Selmanaj

Attack Surface Management

Attack Surface Management

Ron Eddings and MJ Kaufmann

Security and Microservice Architecture on AWS

Security and Microservice Architecture on AWS

Gaurav Raje

Zero Trust Networks

Zero Trust Networks

Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth

Cloud Native Security Cookbook

Cloud Native Security Cookbook

Josh Armitage

  • « Previous
  • 1
  • 2
  • 3
  • 4
  • Book Details

    ...