Security as Code
BK Sarthas Das and Virginia Chu
Land of Lisp
Conrad Barski M.D.
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Practical Cloud Security
Chris Dotson
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Enabling Microservice Success
Sarah Wells
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Developer Career Masterplan
Heather VanCura & Bruno Souza
Computer Science from teh bottom up
Unknown
Learning DevSecOps
Steve Suehring
Guide To YC
Jason Shen
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Practical Process Automation
Bernd Ruecker
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Policy as Code
Jimmy Ray
Security and Microservice Architecture on AWS
Gaurav Raje
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Learning Kali Linux
Ric Messier
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
FastAPI
Bill Lubanovic
Learning GitHub Actions
Brent Laster
CompTIA Network+™ Study Guide
Todd Lammle
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Attack Surface Management
Ron Eddings and MJ Kaufmann
Intelligent Continuous Security
Marc Hornbeek
Web Application Security
Andrew Hoffman
Practical Linux System Administration
Kenneth Hess
Learning Modern Linux
Michael Hausenblas
Delphi High Performance
Primož Gabrijelčič
Software Supply Chain Security
Cassie Crossley
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Threat Modeling
Izar Tarandach and Matthew J. Coles
Inside Cyber Warfare
Jeffrey Caruso
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Terraform: Up and Running
Yevgeniy Brikman
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Linux Pocket Guide
Daniel J. Barrett
Efficient Linux at the Command Line
Cloud Native Security Cookbook
Josh Armitage
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt