Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Database Reliability Engineering
Laine Campbell & Charity Majors
How to Test a Time Machine
Noemí Ferrera
Cybersecurity Incident Response
Eric C. Thompson
The Art of Writing Efficient Programs
Fedor G. Pikus
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Advanced API Security
Prabath Siriwardena
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
PCI DSS
Jim Seaman
Firewalls Don't Stop Dragons
Carey Parker
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Securing Office 365
Matthew Katzer
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Cybersecurity for Space
Jacob G. Oakley
Privileged Attack Vectors
Morey J. Haber
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Professional Red Teaming
Waging Cyber War
Cyber Security on Azure
Marshall Copeland
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cyber Intelligence
Wilson Bautista
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Becoming the Hacker
Adrian Pruteanu
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Mastering pfSense, Second Edition
David Zientara
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Industrial Cybersecurity
Pascal Ackerman
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Penetration Testing on Windows
Phil Bramwell
Metasploit for Beginners
Sagar Rahalkar
Kali Linux - An Ethical Hacker's Cookbook
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Jenkins 2: Up and Running
Brent Laster
Deploying to OpenShift
Graham Dumpleton
Moving Hadoop to the Cloud
Bill Havanki
Effective DevOps
Jennifer Davis & Ryn Daniels
Seeking SRE
David N. Blank-Edelman
Linux Pocket Guide
Daniel J. Barrett
Practical Monitoring
Mike Julian
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Prometheus: Up & Running
Brian Brazil
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
AWS System Administration
Mike Ryan & Federico Lucifredi
Network Attacks and Exploitation
Matthew Monte