Practical Machine Learning
Ted Dunning & Ellen Friedman
Threat Modeling
Izar Tarandach and Matthew J. Coles
Policy as Code
Jimmy Ray
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
GIS Succinctly
Peter Shaw