Test-Driven Development in Go
Adelina Simion
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Software Supply Chain Security
Cassie Crossley
Think Stats
Allen B. Downey
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Learning Domain-Driven Design
Vlad Khononov
Business School For Startups
Fred Wilson
How to Test a Time Machine
Noemí Ferrera
Designing Distributed Systems
Brendan Burns
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Seeking SRE
David N. Blank-Edelman
Linux Pocket Guide
Daniel J. Barrett
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
Network Attacks and Exploitation
Matthew Monte
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
PCI DSS
Jim Seaman
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
The Art of Writing Efficient Programs
Fedor G. Pikus
Security as Code
BK Sarthas Das and Virginia Chu
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Practical Cyber Forensics
Niranjan Reddy
Practical Machine Learning
Ted Dunning & Ellen Friedman
Web Application Security
Andrew Hoffman
Industrial Cybersecurity
Pascal Ackerman
Learn You a Haskell for Great Good!
Miran Lipovaca
Learning Modern Linux
Michael Hausenblas
Effective DevOps
Jennifer Davis & Ryn Daniels
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Enabling Microservice Success
Sarah Wells
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Personal Cybersecurity
Marvin Waschke
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Technology Strategy Patterns
Eben Hewitt
Doing Data Science
Cathy O’Neil & Rachel Schutt
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Moving Hadoop to the Cloud
Bill Havanki
Intelligent Continuous Security
Marc Hornbeek
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Terraform: Up and Running
Yevgeniy Brikman
Learn You Some Erlang For Great Good!
Fred Hebert
Microsoft Windows Networking Essentials
Darril Gibson
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Land of Lisp
Conrad Barski M.D.
Metasploit for Beginners
Sagar Rahalkar
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Policy as Code
Jimmy Ray
Practical Design Patterns for Java Developers
Miroslav Wengner
Professional Red Teaming
Jacob G. Oakley
Flow Architectures
James Urquhart
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Building an Event-Driven Data Mesh
Adam Bellemare
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Learn Java 17 Programming, Second Edition
Nick Samoylov
JavaScript Succinctly
Cody Lindley
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault