Security Books
Operating Systems and Middleware
The scenario describes a user sitting down at a computer to check email. One of the messages includes an attached document to be edited. The user clicks the attachment, and it opens in another window. After starting to edit the document, the user realizes they need to leave for a trip. They save the document in its partially edited state and shut d
Mastering Enterprise Networks, 2nd Edition
Mastering Enterprise Networks, is a comprehensive guide to building, defending, and attacking enterprise networks. It covers a wide range of topics, from network fundamentals to advanced security concepts. The book is well-organized and easy to follow, making it a valuable resource for both beginners and experienced network professionals. One of th
Microservices Best Practices for Java
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book covers Microservices best practices fo
Evolve the Monolith to Microservices with Java and Node
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This IBM Redbooks publication shows how to break
PHP Notes for Professionals
The PHP Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.
Introduction to Computer Science
Introduction to Computer Science provides a comprehensive foundation in core computer science concepts and principles, aligning with the scope and sequence of most introductory computer science courses. The offering serves as an engaging entry point for students pursuing diverse fields of study and employment, including computer science, business,
Data Governance with AWS
How can you ensure that your data is in optimal condition to support your specific business initiatives and operations? With this report from AWS, C-suite executives, including CDOs, CAOs, CISOs, and CSOs, will gain insights on how a targeted approach to data governance can enhance data curation, discovery, protection, and sharing capabilities. Our
Own Your Space, 2nd Edition
This book is presented as a resource for every teenager and an essential tool for parents and teachers. However, the authors specifically target it at computer-savvy, keyboard-comfortable teens who use the internet daily and want to learn how to secure their systems, preserve their digital lifestyles, and protect their data. The book aims to provid
Kubernetes Patterns, 2nd Edition
The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures offer new distributed primitives that require a different set of practices than many developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland H
Android Notes for Professionals
The Android Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.