Humble Tech Book Bundle: Cybersecurity Month by O'Reilly

Loading... ebook

Loading dates...

View on Humble Bundle

Books in this Bundle

Book
Rating
Links
Authors: Ethan Cowan, Michael Shoemate, et al.

Many organizations today analyze and share large, sensitive datasets about indi...

★★★★★
5.0 (1)
Authors: William F. Reyor III, Lee Brotherston, Amanda Berlin

Despite the increase of high-profile hacks, record-breaking data leaks, and ran...

★★★★☆
4.3 (3)
Authors: Cassie Crossley

Trillions of lines of code help us in our lives, companies, and organizations. ...

★★★★☆
4.3 (7)
Authors: Chris Dotson

With rapidly changing architecture and API-driven automation, cloud platforms c...

★★★★☆
4.1 (96)
Authors: Izar Tarandach (Author), Matthew J. Coles

Threat modeling is one of the most essential--and most misunderstood--parts of ...

★★★★☆
4.1 (283)
Authors: Razi Rais , Christina Morillo

This practical book provides a detailed explanation of the zero trust security ...

★★★★☆
4.0 (24)
Authors: Ron Eddings and MJ Kaufmann

Organizations are increasingly vulnerable as attack surfaces grow and cyber thr...

★★★★☆
4.0 (1)
Authors: Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski

Can a system be considered truly reliable if it isn't fundamentally secure? Or ...

★★★½☆
3.9 (192)
Authors: Brian Allen, Brandon Bapst, Terry Allan Hicks

Cyber risk management is one of the most urgent issues facing enterprises today...

★★★½☆
3.8 (6)
Authors: BK Sarthak Das and Virginia Chu

DevOps engineers, developers, and security engineers have ever-changing roles t...

★★★½☆
3.7 (7)
Authors: Jimmy Ray

In today's cloud native world, where we automate as much as possible, everythin...

★★★½☆
3.7 (6)
Authors: Drinor Selmanaj

By incorporating cyber threat intelligence, adversary emulation provides a form...

★★★½☆
3.5 (2)
Authors: Jeffrey Caruso

Get a fascinating and disturbing look into how state and nonstate actors throug...

★★★☆☆
3.2 (23)
Authors: Reet Kaur, Yabing Wang

As technology continues to advance and more business is conducted online, the p...

★★★☆☆
3.0 (4)
Authors: Josh Armitage

With the rise of the cloud, every aspect of IT has been shaken to its core. The...

★★★☆☆
3.0 (3)
Authors: Steve Suehring

How do some organizations maintain 24-7 internet-scale operations? How can orga...

★★½☆☆
2.7 (21)
Authors: Ev Kontsevoy, Sakshyam Shah, et al.

Traditional secret-based credentials can't scale to meet the complexity and siz...

★★½☆☆
2.5 (2)
Authors: Rebekah Brown and Scott J. Roberts

Using a well-conceived incident response plan in the aftermath of an online sec...

☆☆☆☆☆
0.0 (0)
Authors: Marc Hornbeek

With AI in the hands of cybercriminals, traditional security controls and respo...

☆☆☆☆☆
0.0 (0)
Authors: Ric Messier

With hundreds of tools preinstalled, the Kali Linux distribution makes it easie...

☆☆☆☆☆
0.0 (0)
Authors: Mark Buckwell, Stefaan Van daele, Carsten Horst

As the transformation to hybrid multicloud accelerates, businesses require a st...

☆☆☆☆☆
0.0 (0)
Authors: Andrew Hoffman

In the first edition of this critically acclaimed book, Andrew Hoffman defined ...

☆☆☆☆☆
0.0 (0)