O’Reilly Media is an internationally recognized, multi-faceted media company that has played a seminal role in the Internet revolution. Through its books, events, online training courses, webcasts, and evangelism, O’Reilly has educated a generation of technologists and entrepreneurs and shaped the dialogue about the future direction of the industry. The company has played an enormous role in the evolution and adoption of the World Wide Web, open source software, big data, and the Maker movement.
O'Reilly Media - ebooki
-
Zero Trust Networks. 2nd Edition
-
Software Supply Chain Security
-
Web Application Security. 2nd Edition
-
Hacker Culture A to Z
-
Practical Cloud Security. 2nd Edition
-
Identity-Native Infrastructure Access Management
-
Practical Data Privacy
-
Security Chaos Engineering
-
Learning Digital Identity
-
Practical Cloud Native Security with Falco
-
Consul: Up and Running
-
Practical Fraud Prevention
-
Hacking Kubernetes
-
97 Things Every Information Security Professional Should Know
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Modern Data Protection
-
The Cybersecurity Manager's Guide
-
Data Governance: The Definitive Guide
-
97 Things Every SRE Should Know
-
Mastering Blockchain
-
Threat Modeling
-
Blockchain Success Stories
-
Building an Anonymization Pipeline. Creating Safe Data
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Ransomware. Defending Against Digital Extortion
-
Identity and Data Security for Web Development. Best Practices
-
Java Cryptography
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Sharing Big Data Safely. Managing Data Security
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Accumulo. Application Development, Table Design, and Best Practices
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Hadoop Security. Protecting Your Big Data Platform
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Effective Monitoring and Alerting. For Web Operations
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
ScreenOS Cookbook
-
Security Power Tools
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Hacks. 2nd Edition
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Essential PHP Security
-
Internet Forensics
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Snort Cookbook
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Hackers & Painters. Big Ideas from the Computer Age
-
Network Security Assessment. Know Your Network
-
Security Warrior
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Java Security. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition