Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Personal Cybersecurity
Marvin Waschke
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Mastering pfSense, Second Edition
David Zientara
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Python Playground
Mahesh Venkitachalam
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Cybersecurity Incident Response
Eric C. Thompson
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Think Like a Programmer
V. Anton Spraul
Advanced API Security
Prabath Siriwardena
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Red Team Tactics
PCI DSS
Jim Seaman
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Practical Cyber Forensics
Niranjan Reddy
Metasploit for Beginners
Sagar Rahalkar
Becoming the Hacker
Adrian Pruteanu
Data Storage Networking
Nigel Poulton
The Art of Writing Efficient Programs
Fedor G. Pikus
Firewalls Don't Stop Dragons
Carey Parker
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
MCSA Windows Server® 2012 R2
William Panek
Waging Cyber War
Jacob G. Oakley
Professional Red Teaming
Cybersecurity for Space
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Network Attacks and Exploitation
Matthew Monte
Cisco Networking Essentials
Troy McMillan
Art of R Programming
Norman Matloff
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Land of Lisp
Conrad Barski M.D.
Learn You a Haskell for Great Good!
Miran Lipovaca
JavaScript Succinctly
Cody Lindley
Jenkins 2: Up and Running
Brent Laster
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Securing Office 365
Matthew Katzer
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Practical Monitoring
Mike Julian
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
Write Great Code, Volume 2, 2nd Edition
Write Great Code (2)
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Clojure for the Brave and True
Daniel Higginbotham
Learn You Some Erlang For Great Good!
Fred Hebert
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Moving Hadoop to the Cloud
Bill Havanki
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Privileged Attack Vectors
Morey J. Haber