Mastering VMware vSphere 6.7 : effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7 /
VMware vSphere 6.5 cookbook : over 140 task-oriented recipes to install, configure, and manage, and orchestrate various VMware vSphere 6.5 components /
Mastering VMware vSphere 6.5 : leverage the power of vSphere for effective virtualization, administration, management and monitoring of data centers /
VMware vRealize Orchestrator Cookbook - Second Edition.
VSphere high performance cookbook : tune your vSphere to maximize its performance /
VMware vSphere Security Cookbook.
Microsoft Exchange Server 2016 PowerShell Cookbook - Fourth Edition.
Simplifying Service Management with Consul Overcome Connectivity and Security Challenges Within Dynamic Service Architectures.
MASTERING LINUX ADMINISTRATION : a comprehensive guide to installing, configuring, and... maintaining linux systems in the modern data cente.
Securing Remote Access in Palo Alto Networks Practical Techniques to Enable and Protect Remote Users, Improve Your Security Posture, and Troubleshoot Next-Generation Firewalls.
Linux for Networking Professionals : Securely Configure and Operate Linux Network Services for the Enterprise.
Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles.
Linux Command Line and Shell Scripting Techniques : Master Practical Aspects of the Linux Command Line and Then Use It As a Part of the Shell Scripting Process.
The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit.
CRAFTING TEST-DRIVEN SOFTWARE WITH PYTHON : write test suites that scale with your applications... needs and complexity, using python and pytest.
SQL Server 2017 Machine Learning Services with R : Data exploration, modeling, and advanced analytics.
Keycloak - Identity and Access Management for Modern Applications : Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications.
Extending Microsoft Power Apps with Power Apps Component Framework : A Complete Guide to Creating, Deploying, and Improving Your Code Components.
Deep learning from the basics : Python and deep learning : theory and implementation /
Mastering Assembly Programming.
MASTERING VEEAM BACKUP & REPLICATION 10 : protect your virtual environment and implement cloud... backup using veeam technology.
Computer network /
Formal logical methods for system security and correctness /
Network analysis, architecture, and design /
The future of the Internet and how to stop it /
Securing the cloud : cloud computer security techniques and tactics /
Multiple access channels : theory and practice /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Techniques and applications of digital watermarking and content protection /
Toward a national research network /
Managing Cisco network security /
Nokia network security : solutions handbook /
PCI compliance : implementing effective PCI data security standards /
Home networking technologies and standards /
Wireless Internet telecommunications /
Adaptive web sites : a knowledge extraction from web data approach /
Internet and society in Latin America and the Caribbean /
Designing and building enterprise DMZs /
Nessus network auditing /
Ethereal : packet sniffing /
Advanced Topics in Bisimulation and Coinduction.