Serverless Development on AWS
Sheen Brisals & Luke Hedger
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Practical Process Automation
Bernd Ruecker
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Securing Office 365
Matthew Katzer
PCI DSS
Jim Seaman
Building Event-Driven Microservices
Adam Bellemare
Writing API Tests with Karate
Benjamin Bischoff
Learning Kali Linux
Ric Messier
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Policy as Code
Jimmy Ray
Moving Hadoop to the Cloud
Bill Havanki
Learning Systems Thinking
Diana Montalion
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
Cloud Native Security Cookbook
Josh Armitage
Firewalls Don't Stop Dragons
Carey Parker
Practical Machine Learning
Ted Dunning & Ellen Friedman
Practical Cloud Security
Chris Dotson
Practical Linux System Administration
Kenneth Hess
Land of Lisp
Conrad Barski M.D.
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Network Attacks and Exploitation
Matthew Monte
Building Evolutionary Architectures
Neal Ford & Rebecca Parsons & Patrick Kua & and Pramod Sadalage
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Foundations of Scalable Systems
Ian Gorton
Polished Ruby Programming
Jeremy Evans
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Business School For Startups
Fred Wilson
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
The Art of Agile Development
James Shore
Effective Programming
Jeff Atwood
Cybersecurity Incident Response
Eric C. Thompson
Software Architecture Patterns
Mark Richards
Deploying to OpenShift
Graham Dumpleton
Jenkins 2: Up and Running
Brent Laster
Becoming the Hacker
Adrian Pruteanu
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Security as Code
BK Sarthas Das and Virginia Chu
Write Great Code, Volume 2, 2nd Edition
Write Great Code (2)
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Web Application Security
Andrew Hoffman
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Event-Driven Architecture in Golang
Michael Stack
40 Algorithms Every Programmer Should Know
Imran Ahmad
Learning Malware Analysis
MONNAPPA K A
JavaScript Succinctly
Cody Lindley
Terraform: Up and Running
Yevgeniy Brikman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
GIS Succinctly
Peter Shaw
Quantum Computing Algorithms
Barry Burd
Java Memory Management
Maaike van Putten & Sean Kennedy
Metasploit for Beginners
Sagar Rahalkar
The Art of Writing Efficient Programs
Fedor G. Pikus