Practical Linux System Administration
Kenneth Hess
Building Modern CLI Applications in Go
Marian Montagnino
Learn Java 17 Programming, Second Edition
Nick Samoylov
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Red Team Tactics
Himanshu Sharma
Head First Data Analysis
Michael Milton
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
How to Test a Time Machine
Noemí Ferrera
Identity Attack Vectors
Morey J. Haber & Darran Rolls
If Hemingway Wrote JavaScript
Angus Croll
Industrial Cybersecurity
Pascal Ackerman
Java Memory Management
Maaike van Putten & Sean Kennedy
Jenkins 2: Up and Running
Brent Laster
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Land of Lisp
Conrad Barski M.D.
Learn You a Haskell for Great Good!
Miran Lipovaca
Learn You Some Erlang For Great Good!
Fred Hebert
Learning DevSecOps
Steve Suehring
Learning Domain-Driven Design
Vlad Khononov
Learning GitHub Actions
Learning Malware Analysis
MONNAPPA K A
Learning Modern Linux
Michael Hausenblas
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Learning Systems Thinking
Diana Montalion
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Linux Pocket Guide
Daniel J. Barrett
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering pfSense, Second Edition
David Zientara
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
MCSA Windows Server® 2012 R2
William Panek
Metasploit for Beginners
Sagar Rahalkar
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Microsoft Windows Networking Essentials
Darril Gibson
Moving Hadoop to the Cloud
Bill Havanki
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Network Attacks and Exploitation
Matthew Monte
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Open Source Projects - Beyond Code
John Mertic
PCI DSS
Jim Seaman
Personal Cybersecurity
Marvin Waschke
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Polished Ruby Programming
Jeremy Evans
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Practical Cyber Forensics
Niranjan Reddy
Practical Cyber Intelligence
Wilson Bautista