Practical Design Patterns for Java Developers
Miroslav Wengner
Cybersecurity for Space
Jacob G. Oakley
Software Architecture Patterns
Mark Richards
Writing API Tests with Karate
Benjamin Bischoff
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Industrial Cybersecurity
Pascal Ackerman
Privileged Attack Vectors
Morey J. Haber
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
PCI DSS
Jim Seaman
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Waging Cyber War
Practical Cyber Forensics
Niranjan Reddy
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Professional Red Teaming
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Becoming the Hacker
Adrian Pruteanu
Securing Office 365
Matthew Katzer
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Cybersecurity Incident Response
Eric C. Thompson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Firewalls Don't Stop Dragons
Carey Parker
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Mastering pfSense, Second Edition
David Zientara
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Cyber Intelligence
Wilson Bautista
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Kali Linux - An Ethical Hacker's Cookbook
Advanced API Security
Prabath Siriwardena
Metasploit for Beginners
Sagar Rahalkar
Cyber Security on Azure
Marshall Copeland
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Personal Cybersecurity
Marvin Waschke
Cisco Networking Essentials
Troy McMillan
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Network Attacks and Exploitation
Matthew Monte
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Microsoft Windows Networking Essentials
Darril Gibson
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley