10 bestO Reilly Media Software Security Privaciesof February 2025
112M consumers helped this year.
1

The Cybersecurity Manager's Guide: The Art of Building Your Security Program
O'Reilly

9.8
2

TinyML: Machine Learning with TensorFlow Lite on Arduino and Ultra-Low-Power Microcontrollers
O'Reilly

9.6
3

Mastering the Lightning Network: A Second Layer Blockchain Protocol for Instant Bitcoin Payments

9.3
4

The Enterprise Data Catalog: Improve Data Discovery, Ensure Data Governance, and Enable Innovation

9.1
5

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
O'Reilly

8.8
Other
6

Mastering FreeBSD and OpenBSD Security: Building, Securing, and Maintaining BSD Systems
O'Reilly

8.5
7

Web Application Security: Exploitation and Countermeasures for Modern Web Applications

8.2
26% off
8

Security Chaos Engineering: Sustaining Resilience in Software and Systems

7.9
14% off
9

Building Machine Learning Pipelines: Automating Model Life Cycles with TensorFlow
O'Reilly Media

7.6
9% off
10

Threat Modeling: A Practical Guide for Development Teams
O'Reilly Media

7.3

Best Reviews Guide Newsletter
Get exclusive articles, recommendations, shopping tips, and sales alerts
Sign up for our newsletter to receive weekly recommendations about seasonal and trendy products
Thank you for subscribing!
By submitting your email address you agree to our Terms and Conditions and Privacy Policy