Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Practical Process Automation
Bernd Ruecker
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Industrial Cybersecurity
Pascal Ackerman
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Practical Cyber Intelligence
Wilson Bautista
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Cyber Security on Azure
Marshall Copeland
Waging Cyber War
Jacob G. Oakley
Professional Red Teaming
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Privileged Attack Vectors
Morey J. Haber
Cybersecurity for Space
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Securing Office 365
Matthew Katzer
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Firewalls Don't Stop Dragons
Carey Parker
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Advanced API Security
Prabath Siriwardena
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
The Art of Writing Efficient Programs
Fedor G. Pikus