#2 | | 3 | 2 reads | |
#3 | Encrypted Traffic Management for Dummies | 0 | 0 reads | |
#4 | Alex + Ada - Sarah Vaughn
- Jonathan Luna
| 3.88 | 37 reads | |
#5 | C.O.W.L. Volume 1: Principles of Power | 0 | 0 reads | |
#6 | Deadly Class, Volume 1: Reagan Youth | 3.89 | 36 reads | |
#7 | | 0 | 0 reads | |
#8 | Elephantmen 2260, Book 1: Memories of the Future | 4 | 0 reads | |
#9 | God Hates Astronauts, Vol. 1: The Head That Wouldn't Die! | 2 | 3 reads | |
#10 | Minimum Wage Volume 1: Focus on the Strange | 0 | 0 reads | |
#11 | | 3.47 | 19 reads | |
#12 | Satellite Sam, Vol. 1: The Lonesome Death of Satellite Sam | 2 | 2 reads | |
#13 | Sex Criminals: Volume One: One Weird Trick | 3.95 | 120 reads | |
#14 | Shutter, Vol. 1: Wanderlost | 3 | 11 reads | |
#15 | | 4.06 | 27 reads | |
#16 | | 4.4 | 3 reads | |
#17 | | 3 | 2 reads | |
#18 | The Wicked + The Divine, Vol. 1: The Faust Act | 3.68 | 126 reads | |
#19 | The Walking Dead, Vol. 22: A New Beginning | 4.18 | 27 reads | |
#21 | | 0 | 0 reads | |
#22 | | 4.52 | 77 reads | |
#23 | | 3.67 | 9 reads | |
#24 | | 4 | 3 reads | |
#26 | | 4 | 1 read | |
#27 | | 4 | 1 read | |
#28 | | 0 | 0 reads | |
#29 | Website Security for Dummies | 0 | 0 reads | |
#30 | | 0 | 0 reads | |
#31 | | 0 | 0 reads | |
#32 | The Little Book of HTML/CSS Frameworks | 0 | 0 reads | |
#33 | The Little Book of HTML/CSS Coding Guidelines | 0 | 0 reads | |
#34 | | 0 | 0 reads | |
#35 | Not All Data Is Created Equal | 0 | 0 reads | |
#36 | | 3 | 1 read | |
#37 | | 4 | 1 read | |
#38 | Cracking Security Misconceptions | 0 | 0 reads | |
#39 | Next-Generation Endpoint Security For Dummies | 0 | 0 reads | |
#40 | Ten Steps to Linux Survival | 0 | 0 reads | |
#41 | | 0 | 0 reads | |
#42 | Security and Frontend Performance. Breaking the Conundrum - Sabrina Burney
- Sonia Burney
| 0 | 0 reads | |
#43 | The O'Reilly Animals: An Adult Coloring Book | 0 | 0 reads | |
#44 | All-Flash Storage for Dummies, Netapp Special Edition | 0 | 0 reads | |
#45 | Docker Security: Using Containers Safely in Production | 0 | 0 reads | |
#46 | Chaos Engineering. Building Confidence in System Behavior through Experiments - Casey Rosenthal
- Lorin Hochstein
- Aaron Blohowiak
- Nora Jones
- Ali Basiri
| 0 | 0 reads | |
#47 | Post-Incident Reviews: Learning From Failure for Improved Incident Response | 0 | 0 reads | |
#48 | Full Stack Web Performance | 0 | 0 reads | |
#49 | Collaborative Web Development | 0 | 0 reads | |
#50 | California Bones #0: The Dragon Tooth Extraction | 4 | 1 read | |
#51 | Designing Distributed Systems | 0 | 1 read | |
#52 | | 4 | 2 reads | |
#53 | | 4.04 | 142 reads | |
#54 | | 0 | 0 reads | |
#55 | The Automated Traffic Handbook | 0 | 0 reads | |
#56 | Securing Microservice APIs - Matt McLarty
- Rob Wilson
- Scott Morrison
| 0 | 0 reads | |
#57 | Introducing Github: A Non-Technical Guide | 0 | 0 reads | |
#58 | Distributed Denial of Service | 0 | 0 reads | |
#59 | Day One: Junos PyEZ Cookbook - Peter Klimai
- Matt Mellin
- Ben Dale
- Sean Sawtell
- Jessica Garrison
- Michel Tepper
- Jac Backus
- Ivan Del Rio Fernandez
- Paul McGinn
- Scott Ware
- Michelle Zhang
- Diogo Montagner
- Stephen Steiner
| 0 | 0 reads | |
#60 | Day One: Automating Junos® with Ansible | 0 | 0 reads | |
#61 | DNS Security For Dummies®, Infoblox Special Edition - Joshua M. Kuo
- Robert Nagy
- Cricket Liu
| 0 | 0 reads | |
#62 | Mastering Bitcoin: Programming the Open Blockchain | 0 | 1 read | |
#63 | Securing Node Applications | 0 | 0 reads | |
#64 | Modernizing Cybersecurity Operations with Machine Intelligence - Peter Guerra
- Paul Tamburello
| 0 | 0 reads | |
#65 | Web Application Firewalls | 0 | 0 reads | |
#66 | | 0 | 0 reads | |
#67 | Cloud Native Infrastructure: Patterns for Scalable Infrastructure and Applications in a Dynamic Environment | 3.5 | 2 reads | |
#68 | Securing Web Applications | 0 | 0 reads | |
#69 | For I Have Chosen the Path Unseen | 0 | 1 read | |
#70 | Container Storage for Dummies - Ed Tittel
- Sayan Saha
- Steve Watt
- Michael Adam
- Irshad Raihan
| 0 | 0 reads | |
#71 | Microsoft Azure IaaS Solutions | 0 | 0 reads | |
#72 | | 0 | 0 reads | |
#73 | Kubernetes in the Enterprise - Michael Elder
- Jake Kitchener
- Brad Topol
| 0 | 0 reads | |
#74 | Take Control of Your Apple ID | 0 | 0 reads | |
#75 | | 0 | 0 reads | |
#76 | Network Visibility for Dummies | 0 | 0 reads | |
#77 | Network Monitoring & Troubleshooting For Dummies | 0 | 0 reads | |
#78 | Network Monitoring for Dummies, Solarwinds Special Edition | 0 | 0 reads | |
#79 | NetFlow Security Monitoring for Dummies | 0 | 0 reads | |
#80 | Security with AI and Machine Learning | 0 | 0 reads | |
#81 | Glottal's Gift: An Intergalactic Fable | 0 | 0 reads | |
#82 | Introduction to AWS IaaS Solutions | 0 | 0 reads | |
#83 | | 0 | 0 reads | |
#84 | The Ones Who Walk Away from Omelas | 4.27 | 136 reads | |
#85 | Five Principles for Deploying and Managing Linux in the Cloud | 0 | 0 reads | |
#86 | | 0 | 0 reads | |
#87 | Cloud Native DevOps with Kubernetes: Building, Deploying, and Scaling Modern Applications in the Cloud - John Arundel
- Justin Domingus
| 4 | 1 read | |
#88 | | 5 | 1 read | |
#89 | Managing Kubernetes: Operating Kubernetes Clusters in the Real World - Brendan Burns
- Craig Tracey
| 0 | 0 reads | |
#90 | Report on the Investigation into Russian Interference in the 2016 Presidential Election | 0 | 0 reads | |
#91 | Protecting Your Web Applications | 0 | 0 reads | |
#92 | | 0 | 0 reads | |
#93 | | 0 | 0 reads | |
#94 | | 0 | 0 reads | |
#95 | Dead Run Dead Run: A Stephen Dain Mystery | 0 | 0 reads | |
#96 | | 0 | 0 reads | |
#97 | | 2 | 3 reads | |
#98 | Star Wars: Tales From the Far, Far Away, Vol. 1 | 4 | 1 read | |
#99 | Star Wars: Tales From the Far, Far Away, Vol. 2 - Michael Moreci
- Ryan Cady
- Tim Daniel
| 4 | 1 read | |
#100 | | 4.17 | 979 reads | |
#101 | Star Trek: The Next Generation - The Space Between | 0 | 1 read | |
#102 | | 5 | 1 read | |
#103 | Star Trek: Waypoint Special #1 - Dave Baker
- Nicole Goux
- Brandon Easton
- Jackson Lanzig
- Collin Kelly
- Matthew Dow Smith
| 0 | 0 reads | |