Security Books


Operating Systems and Middleware

C / C++

The scenario describes a user sitting down at a computer to check email. One of the messages includes an attached document to be edited. The user clicks the attachment, and it opens in another window. After starting to edit the document, the user realizes they need to leave for a trip. They save the document in its partially edited state and shut d

Mastering Enterprise Networks, 2nd Edition

Hacking

Mastering Enterprise Networks, is a comprehensive guide to building, defending, and attacking enterprise networks. It covers a wide range of topics, from network fundamentals to advanced security concepts. The book is well-organized and easy to follow, making it a valuable resource for both beginners and experienced network professionals. One of th

Microservices Best Practices for Java

Java Cloud

Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book covers Microservices best practices fo

Evolve the Monolith to Microservices with Java and Node

Java Node.js

Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This IBM Redbooks publication shows how to break

PHP Notes for Professionals

PHP

The PHP Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.

Introduction to Computer Science

Algorithms

Introduction to Computer Science provides a comprehensive foundation in core computer science concepts and principles, aligning with the scope and sequence of most introductory computer science courses. The offering serves as an engaging entry point for students pursuing diverse fields of study and employment, including computer science, business,

Data Governance with AWS

AWS

How can you ensure that your data is in optimal condition to support your specific business initiatives and operations? With this report from AWS, C-suite executives, including CDOs, CAOs, CISOs, and CSOs, will gain insights on how a targeted approach to data governance can enhance data curation, discovery, protection, and sharing capabilities. Our

Own Your Space, 2nd Edition

This book is presented as a resource for every teenager and an essential tool for parents and teachers. However, the authors specifically target it at computer-savvy, keyboard-comfortable teens who use the internet daily and want to learn how to secure their systems, preserve their digital lifestyles, and protect their data. The book aims to provid

Kubernetes Patterns, 2nd Edition

Kubernetes Cloud

The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures offer new distributed primitives that require a different set of practices than many developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland H

Android Notes for Professionals

Android

The Android Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow.