Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Privileged Attack Vectors
Morey J. Haber
Becoming the Hacker
Adrian Pruteanu
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Mastering pfSense, Second Edition
David Zientara
AWS System Administration
Mike Ryan & Federico Lucifredi
MCSA Windows Server® 2012 R2
William Panek
Network Attacks and Exploitation
Matthew Monte
Cisco Networking Essentials
Troy McMillan
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Microsoft Windows Networking Essentials
Darril Gibson
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne