Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

Persistence Best Practices for Java Applications

Persistence Best Practices for Java Applications

Otávio Santana & Karina Varela

Beginning Security with Microsoft Technologies

Beginning Security with Microsoft Technologies

Vasantha Lakshmi

Cybersecurity for Space

Cybersecurity for Space

Jacob G. Oakley

Test Automation Engineering Handbook

Test Automation Engineering Handbook

Manikandan Sambamurthy

Books

Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

Rebekah Brown and Scott J. Roberts

Software Supply Chain Security

Software Supply Chain Security

Cassie Crossley

97 Things Every Application Security Professional Should Know

97 Things Every Application Security Professional Should Know

Reet Kaur and Yabing Wang

Learning DevSecOps

Learning DevSecOps

Steve Suehring

Learning Kali Linux

Learning Kali Linux

Ric Messier

Security Architecture for Hybrid Cloud

Security Architecture for Hybrid Cloud

Mark Buckwell & Stefaan Van daele & and Carsten Horst

Building a Cyber Risk Management Program

Building a Cyber Risk Management Program

Brian Allen & Brandon Bapst & and Terry Allan Hicks

Adversary Emulation with MITRE ATT&CK

Adversary Emulation with MITRE ATT&CK

Drinor Selmanaj

Attack Surface Management

Attack Surface Management

Ron Eddings and MJ Kaufmann

Security and Microservice Architecture on AWS

Security and Microservice Architecture on AWS

Gaurav Raje

Zero Trust Networks

Zero Trust Networks

Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth

Cloud Native Security Cookbook

Cloud Native Security Cookbook

Josh Armitage

  • « Previous
  • 1
  • 2
  • 3
  • 4
  • Book Details

    ...