O’Reilly Media is an internationally recognized, multi-faceted media company that has played a seminal role in the Internet revolution. Through its books, events, online training courses, webcasts, and evangelism, O’Reilly has educated a generation of technologists and entrepreneurs and shaped the dialogue about the future direction of the industry. The company has played an enormous role in the evolution and adoption of the World Wide Web, open source software, big data, and the Maker movement.
O'Reilly Media - ebooki
-
Zero Trust Networks. 2nd Edition
-
Software Supply Chain Security
-
Hacker Culture A to Z
-
Identity-Native Infrastructure Access Management
-
Practical Data Privacy
-
Security Chaos Engineering
-
Consul: Up and Running
-
Hacking Kubernetes
-
97 Things Every Information Security Professional Should Know
-
Modern Data Protection
-
Data Governance: The Definitive Guide
-
97 Things Every SRE Should Know
-
Threat Modeling
-
Building an Anonymization Pipeline. Creating Safe Data
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Ransomware. Defending Against Digital Extortion
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Accumulo. Application Development, Table Design, and Best Practices
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Effective Monitoring and Alerting. For Web Operations
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Internet Forensics
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition