Learn You a Haskell for Great Good!
Miran Lipovaca
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Cloud Native Security Cookbook
Josh Armitage
Hands-On Penetration Testing on Windows
Phil Bramwell
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Efficient Linux at the Command Line
Daniel J. Barrett
Linux Pocket Guide
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Terraform: Up and Running
Yevgeniy Brikman
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Inside Cyber Warfare
Jeffrey Caruso
Security as Code
BK Sarthas Das and Virginia Chu
Threat Modeling
Izar Tarandach and Matthew J. Coles
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Software Supply Chain Security
Cassie Crossley
Practical Cloud Security
Chris Dotson
Delphi High Performance
Primož Gabrijelčič
Learning Modern Linux
Michael Hausenblas
Practical Linux System Administration
Kenneth Hess
Web Application Security
Andrew Hoffman
Intelligent Continuous Security
Marc Hornbeek
Attack Surface Management
Ron Eddings and MJ Kaufmann
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
CompTIA Network+™ Study Guide
Todd Lammle
Learning GitHub Actions
Brent Laster
FastAPI
Bill Lubanovic
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Learning Kali Linux
Ric Messier
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Security and Microservice Architecture on AWS
Gaurav Raje
Policy as Code
Jimmy Ray
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Practical Process Automation
Bernd Ruecker
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Guide To YC
Jason Shen
Learning DevSecOps
Steve Suehring
Computer Science from teh bottom up
Unknown
Developer Career Masterplan
Heather VanCura & Bruno Souza
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Enabling Microservice Success
Sarah Wells
The Developer’s Playbook for Large Language Model Security
Steve Wilson