Ebooks

Secret obsession

N. J. Zblendowana

Secret of the River

Fred M. White

Secret Recipes of the Python Ninja. Over 70 recipes that uncover powerful programming tactics in Python

Cody Jackson, Steven F. Lott

Secret Santa opowiadanie erotyczne

Mila Lipa

Secret Sharer

Joseph Conrad

Securing Blockchain Networks like Ethereum and Hyperledger Fabric. Learn advanced security configurations and design principles to safeguard Blockchain networks

Alessandro Parisi

Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure

Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester

Securing Hadoop. Implement robust end-to-end security for your Hadoop ecosystem

Sudheesh Narayan

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls

Tom Piens aka 'reaper'

Securing WebLogic Server 12c. Learn to develop, administer and troubleshoot for WebLogic Server with this book and

Rinaldi Vincenzo, Luca Masini, Vincenzo Rinaldi

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA

Security Automation with Python. Practical Python solutions for automating and scaling security operations

Corey Charles Sr., Frank McMahon

Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco

Adam Józefiok

Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Rajneesh Gupta, Santiago Bassett

Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic, Nicholas Dicola

Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications

Weimin Sun, Xun (Brian) Wu, Angela Kwok

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Security-Driven Software Development. Learn to analyze and mitigate risks in your software projects

Aspen Olmsted

Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam

Mike Chapple

Sed non satiata

Charles Baudelaire

Sedno życia

Katarzyna Kielecka

Sedrun Waro Ludy Wedonu tom III

Anna Nazabi