The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Cyber Security on Azure
Marshall Copeland
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Practical Cyber Forensics
Niranjan Reddy
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
The Art of Writing Efficient Programs
Fedor G. Pikus
Industrial Cybersecurity
Pascal Ackerman
Privileged Attack Vectors
Morey J. Haber
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
PCI DSS
Jim Seaman
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Cybersecurity for Space
Jacob G. Oakley
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Waging Cyber War
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Professional Red Teaming
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Becoming the Hacker
Adrian Pruteanu
Securing Office 365
Matthew Katzer
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Cybersecurity Incident Response
Eric C. Thompson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Firewalls Don't Stop Dragons
Carey Parker
Seeking SRE
David N. Blank-Edelman
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Prometheus: Up & Running
Brian Brazil
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Mastering pfSense, Second Edition
David Zientara
Jenkins 2: Up and Running
Brent Laster
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Cyber Intelligence
Wilson Bautista
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Kali Linux - An Ethical Hacker's Cookbook
Advanced API Security
Prabath Siriwardena
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Metasploit for Beginners
Sagar Rahalkar
Moving Hadoop to the Cloud
Bill Havanki
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Personal Cybersecurity
Marvin Waschke
Effective DevOps
Jennifer Davis & Ryn Daniels
Clojure for the Brave and True
Daniel Higginbotham