Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Building Evolutionary Architectures
Neal Ford & Rebecca Parsons & Patrick Kua & and Pramod Sadalage
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Think Bayes
Allen B. Downey
Think Like a Programmer
V. Anton Spraul
Think Stats
Threat Modeling
Izar Tarandach and Matthew J. Coles
Time Series Databases
Ted Dunning & Ellen Friedman
Transitioning to Java
Ken Fogel
Waging Cyber War
Jacob G. Oakley
Web Application Security
Andrew Hoffman
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
Write Great Code, Volume 2, 2nd Edition
Write Great Code (2)
Writing API Tests with Karate
Benjamin Bischoff
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth