Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Designing Distributed Systems
Brendan Burns
Learning Domain-Driven Design
Vlad Khononov
Practical Design Patterns for Java Developers
Miroslav Wengner
Moving Hadoop to the Cloud
Bill Havanki
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
JavaScript Succinctly
Cody Lindley
Think Like a Programmer
V. Anton Spraul
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Land of Lisp
Conrad Barski M.D.
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Cisco Networking Essentials
Troy McMillan
Business School For Startups
Fred Wilson
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
CompTIA Network+™ Study Guide
Todd Lammle
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Terraform: Up and Running
Yevgeniy Brikman
If Hemingway Wrote JavaScript
Angus Croll
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Building Modern CLI Applications in Go
Marian Montagnino
Quantum Computing Algorithms
Barry Burd
Jenkins 2: Up and Running
Brent Laster
Deploying to OpenShift
Graham Dumpleton
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Delphi High Performance
Primož Gabrijelčič
Learning Modern Linux
Michael Hausenblas
Data Science at the Command Line
Jeroen Janssens
Test Automation Engineering Handbook
Manikandan Sambamurthy
Technical Program Manager’s Handbook
Joshua Alan Teter
Industrial Cybersecurity
Pascal Ackerman
Metasploit for Beginners
Sagar Rahalkar
Event-Driven Architecture in Golang
Michael Stack
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Learn You a Haskell for Great Good!
Miran Lipovaca
Privileged Attack Vectors
Morey J. Haber
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Effective Programming
Jeff Atwood
AWS System Administration
Mike Ryan & Federico Lucifredi
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Practical Cyber Forensics
Niranjan Reddy
Test-Driven Development in Go
Adelina Simion
40 Algorithms Every Programmer Should Know
Imran Ahmad
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Transitioning to Java
Ken Fogel
Foundations of Scalable Systems
Ian Gorton
MCSA Windows Server® 2012 R2
William Panek
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Hands-On Red Team Tactics
Himanshu Sharma
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill