Cyber Security on Azure
Marshall Copeland
Delphi High Performance
Primož Gabrijelčič
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Learning DevSecOps
Steve Suehring
Linux Pocket Guide
Daniel J. Barrett
Serverless Development on AWS
Sheen Brisals & Luke Hedger
FastAPI
Bill Lubanovic
Quantum Computing Algorithms
Barry Burd
Developer Career Masterplan
Heather VanCura & Bruno Souza
Learning GitHub Actions
Brent Laster
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
How to Test a Time Machine
Noemí Ferrera
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Systems Engineering Demystified, Second Edition
Jon Holt
gRPC Go for Professionals
Clément Jean
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
Test-Driven Development in Go
Adelina Simion
Transitioning to Java
Ken Fogel
Practical Linux System Administration
Kenneth Hess
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Writing API Tests with Karate
Benjamin Bischoff
Open Source Projects - Beyond Code
John Mertic
Hands-on Approach to Modern Quantum Algorithms
Unknown
Building Modern CLI Applications in Go
Marian Montagnino
Practical Design Patterns for Java Developers
Miroslav Wengner
Test-Driven Development with Java
Alan Mellor
Embedded Systems Architecture
Daniele Lacamera
Test Automation Engineering Handbook
Manikandan Sambamurthy
Technical Program Manager’s Handbook
Joshua Alan Teter
Event-Driven Architecture in Golang
Michael Stack
Java Memory Management
Maaike van Putten & Sean Kennedy
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Terraform: Up and Running
Yevgeniy Brikman
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Learn Java 17 Programming, Second Edition
Nick Samoylov
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Crystal Programming
George Dietrich & Guilherme Bernal
Learning Modern Linux
Michael Hausenblas
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Efficient Linux at the Command Line
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
The Art of Writing Efficient Programs
Fedor G. Pikus
Industrial Cybersecurity
Pascal Ackerman
Polished Ruby Programming
Jeremy Evans
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Privileged Attack Vectors
Morey J. Haber
40 Algorithms Every Programmer Should Know
Imran Ahmad
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
PCI DSS
Jim Seaman
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Cybersecurity for Space
Jacob G. Oakley
Web Application Security
Andrew Hoffman
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon