gRPC Go for Professionals
Clément Jean
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Metasploit for Beginners
Sagar Rahalkar
Art of R Programming
Norman Matloff
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Write Great Code, Volume 1, 2nd Edition
Write Great Code (1)
Waging Cyber War
Jacob G. Oakley
Think Like a Programmer
V. Anton Spraul
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Seeking SRE
David N. Blank-Edelman
Securing Office 365
Matthew Katzer
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
Python Playground
Mahesh Venkitachalam
Prometheus: Up & Running
Brian Brazil
Professional Red Teaming
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Privileged Attack Vectors
Morey J. Haber
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Practical Monitoring
Mike Julian
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Practical Cyber Intelligence
Wilson Bautista
Practical Cyber Forensics
Niranjan Reddy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Personal Cybersecurity
Marvin Waschke
PCI DSS
Jim Seaman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Network Attacks and Exploitation
Matthew Monte
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Moving Hadoop to the Cloud
Bill Havanki
Microsoft Windows Networking Essentials
Darril Gibson
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Mastering pfSense, Second Edition
David Zientara
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Linux Pocket Guide
Daniel J. Barrett
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Learning Malware Analysis
MONNAPPA K A
Learn You Some Erlang For Great Good!
Fred Hebert
Learn You a Haskell for Great Good!
Miran Lipovaca
Land of Lisp
Conrad Barski M.D.
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Jenkins 2: Up and Running
Brent Laster
JavaScript Succinctly
Cody Lindley
Industrial Cybersecurity
Pascal Ackerman
If Hemingway Wrote JavaScript
Angus Croll
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Hands-On Red Team Tactics
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Firewalls Don't Stop Dragons
Carey Parker
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke