Embedded Systems Architecture
Daniele Lacamera
Prometheus: Up & Running
Brian Brazil
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Deploying to OpenShift
Graham Dumpleton
Linux Pocket Guide
Daniel J. Barrett
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
JavaScript Succinctly
Cody Lindley
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Land of Lisp
Conrad Barski M.D.
Learn You a Haskell for Great Good!
Miran Lipovaca
Microsoft Windows Networking Essentials
Darril Gibson
Art of R Programming
Norman Matloff
Effective Programming
Jeff Atwood
Think Like a Programmer
V. Anton Spraul
Learn You Some Erlang For Great Good!
Fred Hebert
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Data Storage Networking
Nigel Poulton
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
If Hemingway Wrote JavaScript
Angus Croll
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
MCSA Windows Server® 2012 R2
William Panek
Network Attacks and Exploitation
Matthew Monte
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Cisco Networking Essentials
Troy McMillan
Python Playground
Mahesh Venkitachalam
Clojure for the Brave and True
Daniel Higginbotham
Effective DevOps
Jennifer Davis & Ryn Daniels
Personal Cybersecurity
Marvin Waschke
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Moving Hadoop to the Cloud
Bill Havanki
Cyber Security on Azure
Marshall Copeland
Metasploit for Beginners
Sagar Rahalkar
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Advanced API Security
Prabath Siriwardena
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Practical Cyber Intelligence
Wilson Bautista
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Jenkins 2: Up and Running
Brent Laster
Mastering pfSense, Second Edition
David Zientara
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
AWS System Administration
Mike Ryan & Federico Lucifredi
Seeking SRE
David N. Blank-Edelman
Firewalls Don't Stop Dragons
Carey Parker
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Cybersecurity Incident Response
Eric C. Thompson
Hands-On Red Team Tactics
Learning Malware Analysis
MONNAPPA K A
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Securing Office 365
Matthew Katzer