Business School For Startups
Fred Wilson
Systems Engineering Demystified, Second Edition
Jon Holt
Learning Modern Linux
Michael Hausenblas
Technical Program Manager’s Handbook
Joshua Alan Teter
Learning Malware Analysis
MONNAPPA K A
Industrial Cybersecurity
Pascal Ackerman
Effective Programming
Jeff Atwood
Linux Pocket Guide
Daniel J. Barrett
Practical Cyber Intelligence
Wilson Bautista
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Seeking SRE
David N. Blank-Edelman
Hands-On Penetration Testing on Windows
Phil Bramwell
Prometheus: Up & Running
Brian Brazil
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Database Reliability Engineering
Laine Campbell & Charity Majors
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Cyber Security on Azure
Marshall Copeland
If Hemingway Wrote JavaScript
Angus Croll
Effective DevOps
Jennifer Davis & Ryn Daniels
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Deploying to OpenShift
Graham Dumpleton
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Microsoft Windows Networking Essentials
Darril Gibson
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Privileged Attack Vectors
Morey J. Haber
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Moving Hadoop to the Cloud
Bill Havanki
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Learn You Some Erlang For Great Good!
Fred Hebert
Clojure for the Brave and True
Daniel Higginbotham
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
Write Great Code, Volume 2, 2nd Edition
Write Great Code (2)
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Practical Monitoring
Mike Julian
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Securing Office 365
Matthew Katzer
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Jenkins 2: Up and Running
Brent Laster
JavaScript Succinctly
Cody Lindley
Learn You a Haskell for Great Good!
Miran Lipovaca
Land of Lisp
Conrad Barski M.D.
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Art of R Programming
Norman Matloff
Cisco Networking Essentials
Troy McMillan
Network Attacks and Exploitation
Matthew Monte
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Cybersecurity for Space
Jacob G. Oakley
Professional Red Teaming
Waging Cyber War
MCSA Windows Server® 2012 R2
William Panek
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Firewalls Don't Stop Dragons
Carey Parker
The Art of Writing Efficient Programs
Fedor G. Pikus