-
1
Linux® hardening in hostile networks : server security from TLS to TOR /
“…Safari Books Online…”
Get full text
Online Book -
2
-
3
JUNOS automation cookbook : automate network devices on Juniper's operating system /
“…Safari Books Online…”
Get full text
Online Book -
4
OAuth 2.0 cookbook : protect your web applications using Spring Security /
“…Safari Books Online…”
Get full text
Online Book -
5
-
6
Industrial cybersecurity : efficiently secure critical infrastructure systems /
“…Safari Books Online…”
Get full text
Online Book -
7
Linux® hardening in hostile networks : server security from TLS to TOR /
“…Safari Books Online…”
Get full text
Online Book -
8
-
9
JUNOS automation cookbook : automate network devices on Juniper's operating system /
“…Safari Books Online…”
Get full text
Online Book -
10
OAuth 2.0 cookbook : protect your web applications using Spring Security /
“…Safari Books Online…”
Get full text
Online Book -
11
-
12
Industrial cybersecurity : efficiently secure critical infrastructure systems /
“…Safari Books Online…”
Get full text
Online Book -
13
IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices /
“…Safari Books Online…”
Get full text
Online Book -
14
Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools /
“…Safari Books Online…”
Get full text
Online Book -
15
-
16
-
17
Python penetration testing essentials : techniques for ethical hacking with Python /
“…Safari Books Online…”
Get full text
Online Book -
18
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /
“…Safari Books Online…”
Get full text
Online Book -
19
Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls /
“…Safari Books Online…”
Get full text
Online Book -
20
Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps /
“…Safari Books Online…”
Get full text
Online Book