Writing API Tests with Karate
Benjamin Bischoff
Firewalls Don't Stop Dragons
Carey Parker
Transitioning to Java
Ken Fogel
Technology Strategy Patterns
Eben Hewitt
Practical Cloud Security
Chris Dotson
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Java Memory Management
Maaike van Putten & Sean Kennedy
Land of Lisp
Conrad Barski M.D.
Enabling Microservice Success
Sarah Wells
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Cybersecurity Incident Response
Eric C. Thompson
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Think Like a Programmer
V. Anton Spraul
Metasploit for Beginners
Sagar Rahalkar
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
MCSA Windows Server® 2012 R2
William Panek
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Effective Programming
Jeff Atwood
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Threat Modeling
Izar Tarandach and Matthew J. Coles
Practical Cyber Intelligence
Wilson Bautista
Jenkins 2: Up and Running
Brent Laster
Mastering pfSense, Second Edition
David Zientara
Doing Data Science
Cathy O’Neil & Rachel Schutt
Test-Driven Development with Java
Alan Mellor
Building Multi-Tenant SaaS Architectures
Tod Golding
Waging Cyber War
Jacob G. Oakley
Practical Design Patterns for Java Developers
Miroslav Wengner
Technical Program Manager’s Handbook
Joshua Alan Teter
Learning DevSecOps
Steve Suehring
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Practical Monitoring
Mike Julian
Practical Cyber Forensics
Niranjan Reddy
Test Automation Engineering Handbook
Manikandan Sambamurthy
Learn You a Haskell for Great Good!
Miran Lipovaca
Advanced API Security
Prabath Siriwardena
Efficient Linux at the Command Line
Daniel J. Barrett
Inside Cyber Warfare
Jeffrey Caruso
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Open Source Projects - Beyond Code
John Mertic
How to Test a Time Machine
Noemí Ferrera
Security and Microservice Architecture on AWS
Gaurav Raje
Learning Modern Linux
Michael Hausenblas
Systems Engineering Demystified, Second Edition
Jon Holt
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
40 Algorithms Every Programmer Should Know
Imran Ahmad
Learning GitHub Actions
Cybersecurity for Space
Hands-On Red Team Tactics
Himanshu Sharma
Web Application Security
Andrew Hoffman
Kali Linux - An Ethical Hacker's Cookbook