40 Algorithms Every Programmer Should Know
Imran Ahmad
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Threat Modeling
Izar Tarandach and Matthew J. Coles
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Java Memory Management
Maaike van Putten & Sean Kennedy
Learn Java 17 Programming, Second Edition
Nick Samoylov
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Practical Design Patterns for Java Developers
Miroslav Wengner
Test-Driven Development with Java
Alan Mellor
Transitioning to Java
Ken Fogel