Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces
Colin Domoney
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques
Qamar Nomani
Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions
Emmanouil Gkatziouras, Rom Adams, Chen Xi
Network Architect's Handbook - An expert-led journey to building a successful career as a network architect
Alim H. Ali
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
The Software Developer's Guide to Linux - A practical no-nonsense guide to using the Linux command line and utilities as a software developer
David Cohen, Christian Sturm
Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management
Erik Benner, Erik B. Thomsen, Jonathan Spindel
Microsoft Intune Cookbook - Over 75 recipes for configuring managing and automating your identities apps and endpoint devices
Andrew Taylor
Hands-on ESP32 with Arduino IDE - Unleash the power of IoT with ESP32 and build exciting projects with this practical guide
Asim Zulfiqar
Algorithms - Computer Science Unveiled
Rob Botwright
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
The Cloud Computing Journey - Design and deploy resilient and secure multi-cloud systems with practical guidance
Divit Gupta
Architecting AWS with Terraform - Design resilient and secure Cloud Infrastructures with Terraform on Amazon Web Services
Erol Kavas
DevOps for Databases - A practical guide to applying DevOps best practices to data-persistent technologies
David Jambor
Learn Azure Administration - Explore cloud administration concepts with networking computing storage and identity management
Kamil Mrzygłód
Implementing CI CD Using Azure Pipelines - Manage and automate the secure flexible deployment of applications using real-world use cases
Piti Champeethong, Roberto Mardeni
Multistage Interconnection Network Design for Engineers
Shilpa Gupta
Next-Generation switching OS configuration and management Part-2 - Troubleshooting NX-OS in Enterprise Environments
Mamta Devi
AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
Mamta Devi
Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments
Mamta Devi
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic
Mamta Devi
WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks
Mamta Devi
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
C + + - C++ programming
Ummed Singh
ETHICAL HACKING GUIDE-Part 2 - Comprehensive Guide to Ethical Hacking world
Poonam Devi
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi