Learn Java 17 Programming, Second Edition
Nick Samoylov
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
40 Algorithms Every Programmer Should Know
Imran Ahmad
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Cloud Native Security Cookbook
Josh Armitage
Effective Programming
Jeff Atwood
Building Event-Driven Microservices
Adam Bellemare
Building an Event-Driven Data Mesh
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Designing Distributed Systems
Brendan Burns
Inside Cyber Warfare
Jeffrey Caruso
Security as Code
BK Sarthas Das and Virginia Chu
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Threat Modeling
Izar Tarandach and Matthew J. Coles
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Software Supply Chain Security
Cassie Crossley
Practical Cloud Security
Chris Dotson
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Building Evolutionary Architectures
Neal Ford & Rebecca Parsons & Patrick Kua & and Pramod Sadalage
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Building Multi-Tenant SaaS Architectures
Tod Golding
Foundations of Scalable Systems
Ian Gorton
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Technology Strategy Patterns
Eben Hewitt
Web Application Security
Andrew Hoffman
The Software Architect Elevator
Gregor Hohpe
Intelligent Continuous Security
Marc Hornbeek
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Attack Surface Management
Ron Eddings and MJ Kaufmann
Learning Domain-Driven Design
Vlad Khononov
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
JavaScript Succinctly
Cody Lindley
Continuous API Management
Mehdi Medjaoui & Erik Wilde & Ronnie Mitra & and Mike Amundsen
Learning Kali Linux
Ric Messier
Learning Systems Thinking
Diana Montalion
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Building Microservices
Sam Newman
F# Succinctly
Robert Pickering
The Art of Writing Efficient Programs
Fedor G. Pikus
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Security and Microservice Architecture on AWS
Gaurav Raje
Policy as Code
Jimmy Ray
Communication Patterns
Jacqui Read
Software Architecture Patterns
Mark Richards
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Practical Process Automation
Bernd Ruecker
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
GIS Succinctly
Peter Shaw
Guide To YC
Jason Shen
The Art of Agile Development
James Shore
Learning DevSecOps
Steve Suehring
Hands-on Approach to Modern Quantum Algorithms
Computer Science from teh bottom up
Knockout.js Succinctly
Flow Architectures
James Urquhart
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang