Java Memory Management
Maaike van Putten & Sean Kennedy
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Event-Driven Architecture in Golang
Michael Stack
Seeking SRE
David N. Blank-Edelman
AWS System Administration
Mike Ryan & Federico Lucifredi
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Prometheus: Up & Running
Brian Brazil
Jenkins 2: Up and Running
Brent Laster
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Moving Hadoop to the Cloud
Bill Havanki
Effective DevOps
Jennifer Davis & Ryn Daniels
Cisco Networking Essentials
Troy McMillan
Network Attacks and Exploitation
Matthew Monte
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Data Storage Networking
Nigel Poulton
Microsoft Windows Networking Essentials
Darril Gibson
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Deploying to OpenShift
Graham Dumpleton
Linux Pocket Guide
Daniel J. Barrett
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts