CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Land of Lisp
Conrad Barski M.D.
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Python Playground
Mahesh Venkitachalam
Personal Cybersecurity
Marvin Waschke
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Doing Data Science
Cathy O’Neil & Rachel Schutt
Waging Cyber War
Jacob G. Oakley
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Think Like a Programmer
V. Anton Spraul
Learn You Some Erlang For Great Good!
Fred Hebert
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Inside Cyber Warfare
Jeffrey Caruso
Learning Domain-Driven Design
Vlad Khononov
Practical Design Patterns for Java Developers
Miroslav Wengner
Database Reliability Engineering
Laine Campbell & Charity Majors
Firewalls Don't Stop Dragons
Carey Parker
Foundations of Scalable Systems
Ian Gorton
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Transitioning to Java
Ken Fogel
Building Modern CLI Applications in Go
Marian Montagnino
Linux Pocket Guide
Daniel J. Barrett
Microsoft Windows Networking Essentials
Darril Gibson
Learning GitHub Actions
Brent Laster
PCI DSS
Jim Seaman
Event-Driven Architecture in Golang
Michael Stack
Practical Machine Learning with H2O
Darren Cook
Java Memory Management
Maaike van Putten & Sean Kennedy
Mastering pfSense, Second Edition
David Zientara
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Industrial Cybersecurity
Pascal Ackerman
Test-Driven Development in Go
Adelina Simion
Polished Ruby Programming
Jeremy Evans
Time Series Databases
Ted Dunning & Ellen Friedman
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Process Automation
Bernd Ruecker
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Data Science at the Command Line
Jeroen Janssens
Practical Cyber Forensics
Niranjan Reddy
Hands-On Penetration Testing on Windows
Phil Bramwell
Practical Cloud Security
Chris Dotson
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Think Stats
Allen B. Downey
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Think Bayes
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Web Application Security
Andrew Hoffman
Software Supply Chain Security
Cassie Crossley
Learning Malware Analysis
MONNAPPA K A
JavaScript Succinctly
Cody Lindley
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Technical Program Manager’s Handbook
Joshua Alan Teter
Computer Science from teh bottom up
Unknown
Learning DevSecOps
Steve Suehring
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA