Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Personal Cybersecurity
Marvin Waschke
Effective DevOps
Jennifer Davis & Ryn Daniels
Terraform: Up and Running
Yevgeniy Brikman
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Building Microservices
Sam Newman
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Cybersecurity for Space
Jacob G. Oakley
Professional Red Teaming
Waging Cyber War
Doing Data Science
Cathy O’Neil & Rachel Schutt
MCSA Windows Server® 2012 R2
William Panek
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Firewalls Don't Stop Dragons
Carey Parker
The Art of Writing Efficient Programs
Fedor G. Pikus
Data Storage Networking
Nigel Poulton
Becoming the Hacker
Adrian Pruteanu
Java Memory Management
Maaike van Putten & Sean Kennedy
Metasploit for Beginners
Sagar Rahalkar
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Security and Microservice Architecture on AWS
Gaurav Raje
Policy as Code
Jimmy Ray
Communication Patterns
Jacqui Read
Practical Cyber Forensics
Niranjan Reddy
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Software Architecture Patterns
Mark Richards
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Practical Process Automation
Bernd Ruecker
AWS System Administration
Mike Ryan & Federico Lucifredi
Test Automation Engineering Handbook
Manikandan Sambamurthy
Learn Java 17 Programming, Second Edition
Nick Samoylov
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
PCI DSS
Jim Seaman
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Hands-On Red Team Tactics
Himanshu Sharma
Kali Linux - An Ethical Hacker's Cookbook
The Art of Agile Development
James Shore
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Test-Driven Development in Go
Adelina Simion
Advanced API Security
Prabath Siriwardena
Think Like a Programmer
V. Anton Spraul
Event-Driven Architecture in Golang
Michael Stack
Learning DevSecOps
Steve Suehring
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Technical Program Manager’s Handbook
Joshua Alan Teter
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Cybersecurity Incident Response
Eric C. Thompson
Hands-on Approach to Modern Quantum Algorithms
Unknown
Flow Architectures
James Urquhart
Developer Career Masterplan
Heather VanCura & Bruno Souza
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Python Playground
Mahesh Venkitachalam
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Enabling Microservice Success
Sarah Wells
Practical Design Patterns for Java Developers
Miroslav Wengner
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn