Category: Technology

Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition

Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition

Absolute OpenBSD, 2nd Edition

Absolute OpenBSD, 2nd Edition

Amazon Web Services in Action

Amazon Web Services in Action

Ansible Configuration Management

Ansible Configuration Management Tony’s Book Review

Ansible From Beginner to Pro

Ansible From Beginner to Pro

Ansible Up & Running

Ansible Up & Running

Automate the Boring Stuff with Python

Automate the Boring Stuff with Python

Automation through Chef Opscode

Automation through Chef Opscode

AWS Certified Solutions Architect Official Study Guide

AWS Certified Solutions Architect Official Study Guide

AWS System Administration

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

bash Cookbook

bash Cookbook

Bash Pocket Reference, 2nd Edition

Bash Pocket Reference, 2nd Edition

Beginning Drupal 7

Beginning Drupal 7

Beginning MySQL

Beginning MySQL

Beginning Python

Beginning Python

Black Hat Python: Python Programming for Hackers and Pentesters

Build Aweseome Command-Line Applications in Ruby

Build Aweseome Command-Line Applications in Ruby

Building a Server with FreeBSD 7

Building a Server with FreeBSD 7

Chef Infrastructure Automation Cookbook

Chef Infrastructure Automation Cookbook

Classic Shell Scripting

Classic Shell Scripting

Cloud Computing: Concepts, Technology & Architecture

Cloud Computing: Concepts, Technology & Architecture

Continuous Delivery and DevOps: A Quickstart guide

Continuous Delivery and DevOps: A Quickstart guide

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Core Python Applications Programming 3rd Edition

Core Python Applications Programming 3rd Edition

Design Patterns: Elements of Reusable Object-Oriented Software

Design Patterns: Elements of Reusable Object-Oriented Software

DevOps Troubleshooting: Linux Server Best Practices

DevOps Troubleshooting: Linux Server Best Practices Tony’s Book Review

DNS and BIND, 5th Edition

http://shop.oreilly.com/product/9780596100575.do

Docker Cookbook

Docker Cookbook

Docker: Up & Running

Docker: Up & Running

Drupal 7

Drupal 7

Drupal 7 Themes

Drupal 7 Themes

ElasticSearch Server

ElasticSearch Server

Eloquent JavaScript, 2nd Edition

Eloquent JavaScript, 2nd Edition

Essential System Administration, 3rd Edition

Essential System Administration, 3rd Edition

Getting Started with Memcached

Getting Started with Memcached Tony’s Book Review

Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition

Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition

Gray Hat Python

Gray Hat Python

Hacking Vim 7.2

Hacking Vim 7.2

High Performance MySQL, 3rd Edition

High Performance MySQL, 3rd Edition

HTML5 Foundations

HTML5 Foundations

If Hemingway Wrote JavaScript

If Hemingway Wrote JavaScript

Instant Chef Starter

Instant Chef Starter

Instant Metasploit Starter

Instant Metasploit Starter Tony’s Book Review

Instant Varnish Cache How-to

Instant Varnish Cache How-to

Integrating PHP Projects with Jenkins

Integrating PHP Projects with Jenkins

Jenkins Continuous Integration Cookbook Second Edition

Jenkins Continuous Integration Cookbook – Second Edition

Jenkins: The Definitive Guide Continuous integration for the masses

Learn Python the Hard Way

Learn Python the Hard Way

Learning Docker

Learning Docker

Learning Metasploit Exploitation and Development

Learning Metasploit Exploitation and Development

Learning MySQL

Learning MySQL

Learning Python, Second Edition

Learning Python, Second Edition

Learning Ruby

Learning Ruby

Learning SQL, 2nd Edition

Learning SQL, 2nd Edition

Learning the bash Shell, 3rd Edition

Learning the bash Shell, 3rd Edition

Learning the vi and Vim Editors, 7th Edition

Learning the vi and Vim Editors, 7th Edition

Learning Unix for OS X, 2nd Edition

Learning Unix for OS X, 2nd Edition

Linux Administrator Street Smarts: A Real World Guide to Linux Certification Skills

Linux Administrator Street Smarts: A Real World Guide to Linux Certification Skills

Linux Command Line

Linux Command Line and Shell Scripting Bible, 3rd Edition

Linux Command Line and Shell Scripting Bible, 3rd Edition

Linux Firewalls

Linux Firewalls

Linux Pocket Guide, 3rd Edition

Linux Pocket Guide, 3rd Edition

Linux Shell Scripting Cookbook

Linux Shell Scripting Cookbook

Linux Shell Scripting with Bash

Linux Shell Scripting with Bash

LPIC-2 Linux Professional Institute Certification Study Guide

LPIC-2 Linux Professional Institute Certification Study Guide Tony’s Book Review

Mastering Nginx

Mastering Nginx

Metaprogramming Ruby

Metaprogramming Ruby

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester’s Guide

Metasploit: The Penetration Tester’s Guide

Mike Meyers’ CompTIA Security+ Certification Passport, Fourth Edition

Mike Meyers’ CompTIA Security+ Certification Passport, Fourth Edition

Modern PHP

Modern PHP

mod_security Handbook

ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall 1st Edition

ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall 1st Edition

Monitoring with Ganglia

Monitoring with Ganglia Tony’s Book Review

MySQL Admin Cookbook

MySQL Admin Cookbook

MySQL Administrator’s Bible

MySQL Administrator’s Bible

MySQL in a Nutshell, 2nd Edition

MySQL in a Nutshell, 2nd Edition

Nagios: System and Network Monitoring

Nagios: System and Network Monitoring

Nagios, 2nd Edition Tony’s Book Review

Network Troubleshooting Tools

Network Troubleshooting Tools

Nginx HTTP Server

Nginx HTTP Server

Nginx: From Beginner to Pro

Nginx From Beginner to Pro

NoSQL For Dummies

NoSQL For Dummies

OCA Oracle Solaris 11 System Administration Exam Guide (Exam 1Z0-821)

OCA Oracle Solaris 11 System Administration Exam Guide (Exam 1Z0-821) Tony’s Book Review

Oracle Solaris 11 System Administration: The Complete Reference

Oracle Solaris 11 System Administration: The Complete Reference Tony’s Book Review

Penetration Testing

Penetration Testing with the Bash shell

Penetration Testing with the Bash shell Tony’s Book Review

Perl Cookbook

Perl for System Administration

Perl for System Administration

Perl One-Liners

Perl One-Liners

PGP & GPG

PGP & GPG

PHP Advanced and Object-Oriented Programming: Visual QuickPro Guide (3rd Edition)

PHP Advanced and Object-Oriented Programming: Visual QuickPro Guide (3rd Edition)

PHP and MySQL Web Development (3rd Edition)

PHP and MySQL Web Development (3rd Edition)

PHP Cookbook

PHPUnit Essentials

PHPUnit Essentials

Postfix

Postfix

Postfix The Definitive Guide

Postfix The Definitive Guide

PostgreSQL (2nd Edition)

PostgreSQL (2nd Edition)

PostgreSQL Cookbook

PostgreSQL Cookbook

PostgreSQL: Up and Running, 2nd Edition

PostgreSQL: Up and Running, 2nd Edition

Practical Forensic Imaging

Practical Guide to Fedora and Red Hat Enterprise Linux, 7th Edition

Practical Guide to Fedora and Red Hat Enterprise Linux, 7th Edition

Practical Linux Topics

Practical Linux Topics

Practical Monitoring

Practical Packet Analysis

Practical PHP and MySQL Website Databases

Practical PHP and MySQL Website Databases

Practical Ruby for System Administration

Practical Ruby for System Administration

Practical Vim

Practical Vim

Pragmatic Guide to Git

Pragmatic Guide to Git

Pragmatic Guide to Git Tony’s Book Review

Pragmatic Guide to Subversion

Pragmatic Guide to Subversion Tony’s Book Review

Principles of Object-Oriented JavaScript

Principles of Object-Oriented JavaScript

Pro Docker

Pro Docker

Pro Drupal Development

Pro Drupal Development

Pro Git, Second Edition

Pro Git, Second Edition

Pro Linux High Availability Clustering

Pro Linux High Availability Clustering

Pro Perl

Pro Perl

Pro PHP MVC

Pro PHP MVC

Pro Puppet 2nd Edition

Pro Puppet 2nd Edition

Pro Python System Administration 2nd Edition

Pro Python System Administration 2nd Edition

Pro Vagrant

Pro Vagrant

Pro Vim

Pro Vim

Professional WordPress, 2nd Edition

Professional WordPress, 2nd Edition

Programming Perl, 4th Edition

Programming Perl, 4th Edition

Prometheus: Up and Running

Puppet 3: Beginner’s Guide

Puppet 3: Beginner’s Guide

Puppet Types and Providers

Puppet Types and Providers

Python Cookbook

Python for Unix and Linux System Administration

Python for Unix and Linux System Administration

Python Penetration Testing Essentials

Python Penetration Testing Essentials

Python Projects

Python Projects

Python Web Penetration Testing Cookbook

Python Web Penetration Testing Cookbook

Raspberry Pi Cookbook

Ruby by Example

Ruby by Example

Ruby on Rails 3 Tutorial: Learn Rails by Example

Ruby on Rails 3 Tutorial: Learn Rails by Example

Sams Teach Yourself NoSQL with MongoDB in 24 Hours

Sams Teach Yourself NoSQL with MongoDB in 24 Hours

Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition

Securing Linux Platforms and Applications

Securing Linux Platforms and Applications

Security Engineering: A Guide to Building Dependable Distributed Systems

sed & awk, 2nd Edition

sed & awk, 2nd Edition

Seeking SRE

SELinux Cookbook

SELinux Cookbook

SELinux System Administration

SELinux System Administration

Social Engineering: The Art of Human Hack

SQL Cookbook

SQL Injection Attacks and Defense

SQL Injection Attacks and Defense

Systems Performance: Enterprise and the Cloud

Systems Performance: Enterprise and the Cloud

TCP/IP Network Administration, 3rd Edition

TCP/IP Network Administration, 3rd Edition

Test-Driven Infrastructure with Chef, 2nd Edition

Test-Driven Infrastructure with Chef, 2nd Edition

The Basics of Web Hacking

The Basics of Web Hacking

The Book of IMAP

The Book of IMAP

The Logstash Book

The Logstash Book Tony’s Book Review

The Practice of Network Security Monitoring

The Python Standard Library by Example

The Python Standard Library by Example

The Ruby Way, Second Edition

The Ruby Way, Second Edition

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

The Site Reliability Workbook

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 2nd Edition

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 2nd Edition

Think Like a Programmer

Think Python

Think Python

Threat Modeling: Designing for Security

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unix in a Nutshell, 4th Edition

Unix in a Nutshell, 4th Edition

Unix Power Tools, 3rd Edition

Unix Power Tools, 3rd Edition

Vagrant: Up and Running

Vagrant: Up and Running

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Webbots, Spiders, and Screen Scrapers

Webbots, Spiders, and Screen Scrapers

Wicked Cool PHP

Wicked Cool PHP

Wicked Cool Ruby Scripts

Wicked Cool Ruby Scripts

Wicked Cool Shell Scripts

WordPress for Web Developers

WordPress for Web Developers