AWS System Administration
Mike Ryan & Federico Lucifredi
Software Architecture Metrics
Neal Ford & Christian Ciceri & Dave Farley & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Practical Linux System Administration
Kenneth Hess
Metasploit for Beginners
Sagar Rahalkar
Mastering pfSense, Second Edition
David Zientara
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Personal Cybersecurity
Marvin Waschke
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Cybersecurity Incident Response
Eric C. Thompson
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Advanced API Security
Prabath Siriwardena
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Red Team Tactics
PCI DSS
Jim Seaman
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Practical Cyber Forensics
Niranjan Reddy
Becoming the Hacker
Adrian Pruteanu
Firewalls Don't Stop Dragons
Carey Parker
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
MCSA Windows Server® 2012 R2
William Panek
Waging Cyber War
Jacob G. Oakley
Professional Red Teaming
Cybersecurity for Space
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Network Attacks and Exploitation
Matthew Monte
Cisco Networking Essentials
Troy McMillan
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Securing Office 365
Matthew Katzer
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Privileged Attack Vectors
Morey J. Haber
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Microsoft Windows Networking Essentials
Darril Gibson
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Cyber Security on Azure
Marshall Copeland
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Hands-On Penetration Testing on Windows
Phil Bramwell
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Practical Cyber Intelligence
Wilson Bautista
Industrial Cybersecurity
Pascal Ackerman
Learning Malware Analysis
MONNAPPA K A