From 35abae8bf3a0dff91f04e7a6ca88565a4dd27520 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stjepan=20Jurekovi=C4=87?= Date: Thu, 18 Aug 2022 09:28:10 +0200 Subject: [PATCH 1/6] Improved the link to the book Hi, I noticed the link to Secret Key Cryptography was broken, so I fixed it. Thank you. Best, --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 899342c..72ec0ec 100644 --- a/README.md +++ b/README.md @@ -401,7 +401,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog - [Self-Sovereign Identity](https://www.manning.com/books/self-sovereign-identity) - A book about how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. (early access, published continuously, final release fall 2021) - [Data Privacy](https://www.manning.com/books/data-privacy) - A book that teaches you to implement technical privacy solutions and tools at scale. (early access, published continuously, final release January 2022) - [Cyber Security Career Guide](https://www.manning.com/books/cyber-security-career-guide) - Kickstart a career in cyber security by learning how to adapt your existing technical and non-technical skills. (early access, published continuously, final release Summer 2022) -- [Secret Key Cryptography]([https://www.manning.com/books/secret-key-cryptography) - A book about cryptographic techniques and Secret Key methods. (early access, published continuously, final release Summer 2022) +- [Secret Key Cryptography](https://www.manning.com/books/secret-key-cryptography) - A book about cryptographic techniques and Secret Key methods. (early access, published continuously, final release Summer 2022) - [The Security Engineer Handbook](https://securityhandbook.io/) - A short read that discusses the dos and dont's of working in a security team, and the many tricks and tips that can help you in your day-to-day as a security engineer. ## Other Awesome Lists From b3fa79f5cb2579c949790ec601372c4afd544f00 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stjepan=20Jurekovi=C4=87?= Date: Thu, 29 Sep 2022 10:26:50 +0200 Subject: [PATCH 2/6] Added Cyber Threat Hunting Hi, Stjepan from Manning here. I thought this title might be a good match for your list. Thank you for considering it. Best, --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 72ec0ec..f308c92 100644 --- a/README.md +++ b/README.md @@ -403,6 +403,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog - [Cyber Security Career Guide](https://www.manning.com/books/cyber-security-career-guide) - Kickstart a career in cyber security by learning how to adapt your existing technical and non-technical skills. (early access, published continuously, final release Summer 2022) - [Secret Key Cryptography](https://www.manning.com/books/secret-key-cryptography) - A book about cryptographic techniques and Secret Key methods. (early access, published continuously, final release Summer 2022) - [The Security Engineer Handbook](https://securityhandbook.io/) - A short read that discusses the dos and dont's of working in a security team, and the many tricks and tips that can help you in your day-to-day as a security engineer. +- [Cyber Threat Hunting](https://www.manning.com/books/cyber-threat-hunting) - Practical guide to cyber threat hunting. ## Other Awesome Lists From 6ed31006c6261995f6b8f7f93cda76a5d129a253 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stjepan=20Jurekovi=C4=87?= Date: Wed, 11 Jan 2023 11:50:15 +0100 Subject: [PATCH 3/6] Added Edge Computing Rechnology and Applications Hi, Stjepan from Manning here. I think this title might be a good match for your list. Thank you for considering it. Best, --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f308c92..f797d42 100644 --- a/README.md +++ b/README.md @@ -404,6 +404,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog - [Secret Key Cryptography](https://www.manning.com/books/secret-key-cryptography) - A book about cryptographic techniques and Secret Key methods. (early access, published continuously, final release Summer 2022) - [The Security Engineer Handbook](https://securityhandbook.io/) - A short read that discusses the dos and dont's of working in a security team, and the many tricks and tips that can help you in your day-to-day as a security engineer. - [Cyber Threat Hunting](https://www.manning.com/books/cyber-threat-hunting) - Practical guide to cyber threat hunting. +- [Edge Computing Rechnology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy. ## Other Awesome Lists From fdb0cef53b3dab1f53e70fef4b55cb8229a5e53a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stjepan=20Jurekovi=C4=87?= Date: Thu, 19 Jan 2023 12:53:43 +0100 Subject: [PATCH 4/6] Added Spring Security in Action, Second Edition Hi, Stjepan from Manning here. I thought this title might be a good match for your list. Thank you for considering it. Best, --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f797d42..755b96c 100644 --- a/README.md +++ b/README.md @@ -405,6 +405,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog - [The Security Engineer Handbook](https://securityhandbook.io/) - A short read that discusses the dos and dont's of working in a security team, and the many tricks and tips that can help you in your day-to-day as a security engineer. - [Cyber Threat Hunting](https://www.manning.com/books/cyber-threat-hunting) - Practical guide to cyber threat hunting. - [Edge Computing Rechnology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy. +- [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start. ## Other Awesome Lists From 94c8537d176736f0c51fb9869a34be2983d02140 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stjepan=20Jurekovi=C4=87?= Date: Thu, 19 Jan 2023 12:55:16 +0100 Subject: [PATCH 5/6] Corrected a typo Hi, I corrected a typo in my previous contribution. Best, --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 755b96c..5504846 100644 --- a/README.md +++ b/README.md @@ -404,7 +404,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog - [Secret Key Cryptography](https://www.manning.com/books/secret-key-cryptography) - A book about cryptographic techniques and Secret Key methods. (early access, published continuously, final release Summer 2022) - [The Security Engineer Handbook](https://securityhandbook.io/) - A short read that discusses the dos and dont's of working in a security team, and the many tricks and tips that can help you in your day-to-day as a security engineer. - [Cyber Threat Hunting](https://www.manning.com/books/cyber-threat-hunting) - Practical guide to cyber threat hunting. -- [Edge Computing Rechnology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy. +- [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy. - [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start. ## Other Awesome Lists From fef7099db9c8ea179bbe8c8bf01d60702149c30e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stjepan=20Jurekovi=C4=87?= Date: Thu, 2 Feb 2023 13:45:56 +0100 Subject: [PATCH 6/6] Added Azure Security Hi, Stjepan here from Manning. I thought this title might be a good match for your list. Thank you for considering it. Best, --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 5504846..603588c 100644 --- a/README.md +++ b/README.md @@ -406,6 +406,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog - [Cyber Threat Hunting](https://www.manning.com/books/cyber-threat-hunting) - Practical guide to cyber threat hunting. - [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy. - [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start. +- [Azure Security](https://www.manning.com/books/azure-security-2) - A practical guide to the native security services of Microsoft Azure. ## Other Awesome Lists