Learning Modern Linux
Michael Hausenblas
Network Attacks and Exploitation
Matthew Monte
Practical Machine Learning with H2O
Darren Cook
The Developer’s Playbook for Large Language Model Security
Steve Wilson
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Attack Surface Management
Ron Eddings and MJ Kaufmann
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Cloud Native Security Cookbook
Josh Armitage
CompTIA Network+™ Study Guide
Todd Lammle
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Computer Science from teh bottom up
Unknown
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Delphi High Performance
Primož Gabrijelčič
Developer Career Masterplan
Heather VanCura & Bruno Souza
Efficient Linux at the Command Line
Daniel J. Barrett
Enabling Microservice Success
Sarah Wells
FastAPI
Bill Lubanovic
Guide To YC
Jason Shen
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Inside Cyber Warfare
Jeffrey Caruso
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Intelligent Continuous Security
Marc Hornbeek
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Learning DevSecOps
Steve Suehring
Learning GitHub Actions
Brent Laster
Learning Kali Linux
Ric Messier
Linux Pocket Guide
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Policy as Code
Jimmy Ray
Practical Cloud Security
Chris Dotson
Practical Linux System Administration
Kenneth Hess
Practical Process Automation
Bernd Ruecker
Security and Microservice Architecture on AWS
Gaurav Raje
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Security as Code
BK Sarthas Das and Virginia Chu
Software Supply Chain Security
Cassie Crossley
Terraform: Up and Running
Yevgeniy Brikman
Threat Modeling
Izar Tarandach and Matthew J. Coles
Web Application Security
Andrew Hoffman
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth