O’Reilly Media is an internationally recognized, multi-faceted media company that has played a seminal role in the Internet revolution. Through its books, events, online training courses, webcasts, and evangelism, O’Reilly has educated a generation of technologists and entrepreneurs and shaped the dialogue about the future direction of the industry. The company has played an enormous role in the evolution and adoption of the World Wide Web, open source software, big data, and the Maker movement.
Wydawnictwo O'Reilly Media
Tytuły książek(ebooki,audiobooki) wydawnictwa: O'Reilly Media
-
Hackers & Painters. Big Ideas from the Computer Age
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Practical Data Privacy
-
Network Security Assessment. Know Your Network
-
Hacking Kubernetes
-
Threat Modeling
-
Mastering Blockchain
-
97 Things Every SRE Should Know
-
Data Governance: The Definitive Guide
-
The Cybersecurity Manager's Guide
-
Modern Data Protection
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
97 Things Every Information Security Professional Should Know
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Practical Cloud Native Security with Falco
-
Learning Digital Identity
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Identity and Data Security for Web Development. Best Practices
-
Ransomware. Defending Against Digital Extortion
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Security Warrior
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Web Security, Privacy & Commerce. 2nd Edition
-
Accumulo. Application Development, Table Design, and Best Practices
-
Internet Forensics
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Java Cryptography
-
Sharing Big Data Safely. Managing Data Security
-
Essential PHP Security
-
Programming .NET Security
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Security Power Tools
-
Security and Usability. Designing Secure Systems that People Can Use
-
Effective Monitoring and Alerting. For Web Operations
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Practical Fraud Prevention
-
Consul: Up and Running
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Identity-Native Infrastructure Access Management
-
Building an Anonymization Pipeline. Creating Safe Data
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Blockchain Success Stories
-
Building Internet Firewalls. 2nd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Database Nation. The Death of Privacy in the 21st Century
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Hacks. 2nd Edition
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
ScreenOS Cookbook
-
Hacking: The Next Generation. The Next Generation
-
Snort Cookbook
-
Linux Security Cookbook
-
Managing Security with Snort & IDS Tools
-
Beautiful Security. Leading Security Experts Explain How They Think
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Hadoop Security. Protecting Your Big Data Platform
-
Security Monitoring
-
Practical UNIX and Internet Security. 3rd Edition
-
Security Chaos Engineering
-
Practical Cloud Security. 2nd Edition
-
Hacker Culture A to Z
-
Web Application Security. 2nd Edition
-
Software Supply Chain Security
-
Zero Trust Networks. 2nd Edition
-
Hands-On Differential Privacy
-
Learning DevSecOps
-
Defensive Security Handbook. 2nd Edition
-
Learning Kali Linux. 2nd Edition
-
Inside Cyber Warfare. 3rd Edition
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Digital Identity
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Java Security. 2nd Edition
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts