Systemsicherheit

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jarosław Krochmalski

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR

Guven Boyraz

Enhancing Your Cloud Security with a CNAPP Solution. Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security

Yuri Diogenes

Enterprise Agility. Being Agile in a Changing World

Sunil Mundra

Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform

Ganesan Senthilvel, Ovais Mehboob Ahmed Khan, Habib Qureshi

Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles

Zeal Vora

Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser

Alessandro Segala

Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Manoj P R

Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal