Book Book
  • Advanced Search
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Architecture (Public)
  • General (Public)
  • Get Started (Public)
  • Security (Public)

Discover (Random Books)

How to Test a Time Machine

How to Test a Time Machine

Noemí Ferrera

Learning Domain-Driven Design

Learning Domain-Driven Design

Vlad Khononov

Realm of Racket: Learn to Program, One Game at a Time!

Realm of Racket: Learn to Program, One Game at a Time!

Conrad Barski M.D. & Matthias Felleisen & David Van Horn & Eight Students of Northeastern University

Test-Driven Development with Java

Test-Driven Development with Java

Alan Mellor

Publisher: Apress

Solving Identity and Access Management in Modern Applications

Solving Identity and Access Management in Modern Applications

Yvonne Wilson & Abhishek Hingnikar

Identity Attack Vectors

Identity Attack Vectors

Morey J. Haber & Darran Rolls

Advanced API Security

Advanced API Security

Prabath Siriwardena

Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Nihad A. Hassan & Rami Hijazi

PCI DSS

PCI DSS

Jim Seaman

Cybersecurity Incident Response

Cybersecurity Incident Response

Eric C. Thompson

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons

Carey Parker

Applied Cryptography in .NET and Azure Key Vault

Applied Cryptography in .NET and Azure Key Vault

Stephen Haunts

Securing Office 365

Securing Office 365

Matthew Katzer

Beginning Security with Microsoft Technologies

Beginning Security with Microsoft Technologies

Vasantha Lakshmi

Personal Cybersecurity

Personal Cybersecurity

Marvin Waschke

Practical Cyber Forensics

Practical Cyber Forensics

Niranjan Reddy

Pro Azure Governance and Security

Pro Azure Governance and Security

Peter De Tender & Samuel Erskine & David Rendon

Cybersecurity for Space

Cybersecurity for Space

Jacob G. Oakley

Privileged Attack Vectors

Privileged Attack Vectors

Morey J. Haber

Enterprise Cybersecurity Study Guide

Enterprise Cybersecurity Study Guide

Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam

Professional Red Teaming

Professional Red Teaming

Jacob G. Oakley

Waging Cyber War

Waging Cyber War

Jacob G. Oakley

Cyber Security on Azure

Cyber Security on Azure

Marshall Copeland

Practical Cryptography in Python

Practical Cryptography in Python

Seth James Nielson & Christopher K. Monson

Book Details

...