Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Firewalls Don't Stop Dragons
Carey Parker
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Learning DevSecOps
Steve Suehring
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Policy as Code
Jimmy Ray
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Learning Kali Linux
Ric Messier
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Inside Cyber Warfare
Jeffrey Caruso
Attack Surface Management
Ron Eddings and MJ Kaufmann
Intelligent Continuous Security
Marc Hornbeek