Prometheus: Up & Running
Brian Brazil
Crystal Programming
George Dietrich & Guilherme Bernal
Business School For Startups
Fred Wilson
Foundations of Scalable Systems
Ian Gorton
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Art of R Programming
Norman Matloff
The Art of Writing Efficient Programs
Fedor G. Pikus
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
AWS System Administration
Mike Ryan & Federico Lucifredi
Becoming the Hacker
Adrian Pruteanu
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Cisco Networking Essentials
Troy McMillan
Clojure for the Brave and True
Daniel Higginbotham
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Cloud Native Infrastructure
Justin Garrison & Kris Nova
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Jacob G. Oakley
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Data Storage Networking
Nigel Poulton
Database Reliability Engineering
Laine Campbell & Charity Majors
Deploying to OpenShift
Graham Dumpleton
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Effective DevOps
Jennifer Davis & Ryn Daniels
Effective Programming
Jeff Atwood
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Firewalls Don't Stop Dragons
Carey Parker
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Red Team Tactics
Himanshu Sharma
Identity Attack Vectors
Morey J. Haber & Darran Rolls
If Hemingway Wrote JavaScript
Angus Croll
Industrial Cybersecurity
Pascal Ackerman
JavaScript Succinctly
Cody Lindley
Jenkins 2: Up and Running
Brent Laster
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Land of Lisp
Conrad Barski M.D.
Learn You a Haskell for Great Good!
Miran Lipovaca
Learn You Some Erlang For Great Good!
Fred Hebert
Learning Malware Analysis
MONNAPPA K A
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Linux Pocket Guide
Daniel J. Barrett
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering pfSense, Second Edition
David Zientara
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
MCSA Windows Server® 2012 R2
William Panek
Metasploit for Beginners
Sagar Rahalkar
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Microsoft Windows Networking Essentials
Darril Gibson
Moving Hadoop to the Cloud
Bill Havanki
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Network Attacks and Exploitation
Matthew Monte
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley