Systemsicherheit

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jarosław Krochmalski

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR

Guven Boyraz

Enhancing Your Cloud Security with a CNAPP Solution. Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security

Yuri Diogenes

Enterprise Agility. Being Agile in a Changing World

Sunil Mundra

Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform

Ganesan Senthilvel, Ovais Mehboob Ahmed Khan, Habib Qureshi

Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles

Zeal Vora

Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser

Alessandro Segala

Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Manoj P R

Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd

Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula

Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform

Atul Mistry

Exploring Experience Design. Fusing business, tech, and design to shape customer engagement

Ezra Schwartz

Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

William Roberts, William Confer

Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments

Alex Callejas

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker

GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition

Stefano Iacovella

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

A. P. David