BOOKS - NETWORK TECHNOLOGIES - OpenStack Cloud Security (+code)
OpenStack Cloud Security (+code) - Dr Alex Blewitt 2015 PDF | EPUB Packt Publishing BOOKS NETWORK TECHNOLOGIES
ECO~30 kg CO²

3 TON

Views
15380

Telegram
 
OpenStack Cloud Security (+code)
Author: Dr Alex Blewitt
Year: 2015
Format: PDF | EPUB
File size: 6 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Hacking 4 Books in 1- Hacking for Beginners, Hacker Basic Security, Networking Hacking, Kali Linux for Hackers
Intelligent Systems Modeling and Simulation III Artificial Intelligent, Machine Learning, Intelligent Functions and Cyber Security
The Templar Detective and the Code Breaker (The Templar Detective Thrillers #5)
Hannah Maes - Hij is terug (Code 37, #13; Hannah Maes, #1)
Big Data, Data Mining and Data Science Algorithms, Infrastructures, Management and Security
Ultimate Blockchain Security Handbook Advanced Cybersecurity Techniques and Strategies for Risk Management, Threat Modeling, Pen Testing, and Smart Contract Defense for Blockchain
Python (2nd Edition) Learn Python in a day and be a professional This book makes coding with Python easy Python for Beginners Learn to code with Python
Python (2nd Edition) Learn Python in a day and be a professional This book makes coding with Python easy Python for Beginners Learn to code with Python
Entity Framework Core From SQL to C# code Start with Entity Framework Core and implement it in your own applications in no time!
Entity Framework Core From SQL to C# code Start with Entity Framework Core and implement it in your own applications in no time!
Linux for Absolute Beginners: 5 Books in 1 The Ultimate Guide to Advanced Linux Programming, Kernel Mastery, Robust Security Measures, System Automation, and In-Depth Hands-on Exercises
Learn Java Programming A Definitive Crash Course For Beginners to Learn Java Fast. Secrets, Tips and Tricks to Programming with Java Code and The Fundamentals to Creating Your First Program
Ifla Cataloguing Principles: Steps Towards an International Cataloguing Code, 4: Report from the 4th Ifla Meeting of Experts on an International Catal (Ifla Series on Bibliographic Control)
Raspberry Pi Setup, Programming and Developing Amazing Projects with Raspberry Pi for Beginners - With Source Code and Step by Step Guides (Raspberry Pi Programming Guide Book 1)
Weaponizing Water: Water Stress and Islamic Extremist Violence in Africa and the Middle East (Iraq;Nigeria;Somalia;Syria;Boko Haram;ISIS;Al-Shabaab;environmental security)
Ultimate Blockchain Security Handbook: Advanced Cybersecurity Techniques and Strategies for Risk Management, Threat Modeling, Pen Testing, and Smart Contract Defense for Blockchain (English Edition)
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I (Lecture Notes in Computer Science, 13905)
javascript The Ultimate Guide to Understand javascript Code and its Fundamentals
.NET 7 Design Patterns In-Depth Enhance code efficiency and maintainability with .NET Design Patterns
.NET 7 Design Patterns In-Depth Enhance code efficiency and maintainability with .NET Design Patterns
Excel VBA Step by Step Guide to Learn Excel VBA Programming with Screenshots and Example Code
Design Patterns in .NET Mastering design patterns to write dynamic and effective .NET Code
Design Patterns in .NET Mastering design patterns to write dynamic and effective .NET Code
The DeCadia Code (Decadia #1)
Code of the Necromancer (Necromancer, #2)
Code of Honor (Honor, #8)
Netwars: The Code (netwars, #1.1)
Code Name: Griffin (Griffin #1)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801: Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
CompTIA Security+ SY0-701 Practice Tests and PBQs: Exam SY0-701 (Online Access Included)
CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004 (Sybex Study Guide)
Computational Intelligence and Blockchain in Complex Systems: System Security and Interdisciplinary Applications (Advanced Studies in Complex Systems)
Ethical Hacking Bible Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux
Hands-On Penetration Testing on Windows Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
The Trafficking of Children: International Law, Modern Slavery, and the Anti-Trafficking Machine (Transnational Crime, Crime Control and Security)
Spring Boot 3.0 Crash Course: Mastering Spring Boot, from Application Development to Advanced Security, Data Access, Integration and Deployment
The GCC and the International Relations of the Gulf: Diplomacy, Security and Economic Coordination in a Changing Middle East (Library of International Relations)
Spring Boot 3.0 Crash Course Mastering Spring Boot, from Application Development to Advanced Security, Data Access, Integration and Deployment
Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges (Prospects in Smart Technologies)
Blue Team Handbook SOC, SIEM, and Threat Hunting (V1.02) A Condensed Guide for the Security Operations Team and Threat Hunter