Books @ Henschen Cloud
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Categories
  • Series
  • Shelves

Discover (Random Books)

The Unofficial Bridgerton Cookbook: From The Viscount's Mushroom Miniatures and The Royal Wedding Oysters to Debutante Punch and The Duke's Favorite Gooseberry Pie, 100 Dazzling Recipes Inspired by Bridgerton

The Unofficial Bridgerton Cookbook: From The Viscount's Mushroom ...

Lex Taylor

The Unofficial Princess Bride Cookbook

The Unofficial Princess Bride Cookbook

Cassandra Reeder

Horton and the Kwuggerbug and More Lost Stories

Horton and the Kwuggerbug and More Lost Stories

Dr. Seuss

Horton the Elephant (1)

If I Ran the Circus

If I Ran the Circus

Dr. Seuss

Publisher: Packt Publishing Pvt Ltd

The Vulnerability Researcher’s Handbook

The Vulnerability Researcher’s Handbook

Benjamin Strout

Threat Hunting with Elastic Stack

Threat Hunting with Elastic Stack

Andrew Pease

Refactoring with C#

Refactoring with C#

Matt Eland

Real-World Implementation of C# Design Patterns

Real-World Implementation of C# Design Patterns

Bruce M. Van Horn II

Practical Threat Intelligence and Data-Driven Threat Hunting

Practical Threat Intelligence and Data-Driven Threat Hunting

Valentina Palacín

PowerShell Automation and Scripting for Cybersecurity

PowerShell Automation and Scripting for Cybersecurity

Miriam C. Wiesner

Operationalizing Threat Intelligence

Operationalizing Threat Intelligence

Kyle Wilhoit Joseph Opacki

Microservices Communication in .NET Using gRPC

Microservices Communication in .NET Using gRPC

Fiodar Sazanavets

Mastering Cyber Intelligence

Mastering Cyber Intelligence

Jean Nestor M. Dahj

Mastering Cloud Security Posture Management (CSPM)

Mastering Cloud Security Posture Management (CSPM)

Qamar Nomani

Machine Learning Security Principles

Machine Learning Security Principles

John Paul Mueller

Industrial Cybersecurity

Industrial Cybersecurity

Pascal Ackerman

Incident Response with Threat Intelligence

Incident Response with Threat Intelligence

Roberto Martínez

High-Performance Programming in C# and .NET

High-Performance Programming in C# and .NET

Jason Alls

Enterprise Application Development with C# 10 and .NET 6

Enterprise Application Development with C# 10 and .NET 6

Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...

A Developer's Guide to .NET in Azure

A Developer's Guide to .NET in Azure

Anuraj Parameswaran & Tamir Al Balkhi

ChatGPT for Cybersecurity Cookbook

ChatGPT for Cybersecurity Cookbook

Clint Bodungen

C# Interview Guide

C# Interview Guide

Konstantin Semenenko

C# Data Structures and Algorithms

C# Data Structures and Algorithms

Marcin Jamro

Automating Security Detection Engineering

Automating Security Detection Engineering

Dennis Chow

Aligning Security Operations with the MITRE ATT&CK Framework

Aligning Security Operations with the MITRE ATT&CK Framework

Rebecca Blair

Book Details

...