CodersGrove
.com
Books
Articles
Tutorials
Sign Up
Sign In
Popular Books
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
Author:
Gene Kim
Author:
Patrick Debois
Author:
John Willis
Author:
Jez Humble
Increase profitability, elevate work culture, and exceed productivity goals through DevOps practices.More than ever, the effective man…
(4
)
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
Author:
Todd Barnum
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec pr…
(4
)
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Author:
Evan Gilman
Author:
Doug Barth
No description added
(4
)
Artificial Intelligence: A Guide for Thinking Humans
Author:
Melanie Mitchell
A sweeping examination of the current state of artificial intelligence and how it is remaking our worldNo recent scientific ent…
(4
)
Open Sources: Voices from the Open Source Revolution
Author:
Chris DiBona
Author:
Sam Ockman
Author:
Mark Stone
Freely available source code, with contributions from thousands of programmers around the this is the spirit of the software revolution known as O…
(4
)
Zero to One: Notes on Startups, or How to Build the Future
Author:
Peter Thiel
Author:
Blake Masters
If you want to build a better future, you must believe in secrets.The great secret of our time is that there are still uncharted front…
(4
)
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Author:
Heather Adkins
Author:
Betsy Beyer
Author:
Paul Blankinship
Author:
Ana Oprea
Author:
Piotr Lewandowski
Author:
Adam Stubblefield
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial…
(4
)
Site Reliability Engineering: How Google Runs Production Systems
Author:
Betsy Beyer
Author:
Chris Jones
Author:
Jennifer Petoff
Author:
Niall Richard Murphy
The overwhelming majority of a software system's lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insis…
(4
)
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Author:
Michael Sikorski
Author:
Andrew Honig
No description added
(4
)
Identity and Access Management: Business Performance Through Connected Intelligence
Author:
Ertem Osmanoglu
No description added
(4
)
Privacy’s Blueprint: The Battle to Control the Design of New Technologies
Author:
Woodrow Hartzog
No description added
(4
)
Crossing the Chasm: Marketing and Selling High-Tech Products to Mainstream Customers
Author:
Geoffrey A. Moore
Author:
Regis McKenna
Here is the bestselling guide that created a new game plan for marketing in high-tech industries. Crossing the Chasm has become the bible for brin…
(4
)
2
3
4
5
6
Home
About
Sitemap
Privacy Policy
© 2023 CodersGrove.com