Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
PCI DSS
Jim Seaman
Becoming the Hacker
Adrian Pruteanu
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Professional Red Teaming
Jacob G. Oakley
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cyber Forensics
Niranjan Reddy
Waging Cyber War
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Cybersecurity for Space
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Privileged Attack Vectors
Morey J. Haber
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Industrial Cybersecurity
Pascal Ackerman
The Art of Writing Efficient Programs
Fedor G. Pikus
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Serverless Development on AWS
Sheen Brisals & Luke Hedger