Learning Domain-Driven Design
Vlad Khononov
Learning GitHub Actions
Brent Laster
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Privileged Attack Vectors
Morey J. Haber
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Waging Cyber War
Jacob G. Oakley
Practical Cyber Forensics
Niranjan Reddy
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Professional Red Teaming
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Becoming the Hacker
Adrian Pruteanu
Securing Office 365
Matthew Katzer
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Cybersecurity Incident Response
Eric C. Thompson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Firewalls Don't Stop Dragons
Carey Parker
Seeking SRE
David N. Blank-Edelman
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Prometheus: Up & Running
Brian Brazil
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Mastering pfSense, Second Edition
David Zientara
Jenkins 2: Up and Running
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Cyber Intelligence
Wilson Bautista
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Designing Distributed Systems
Brendan Burns
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Kali Linux - An Ethical Hacker's Cookbook
Advanced API Security
Prabath Siriwardena
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Metasploit for Beginners
Sagar Rahalkar
Cyber Security on Azure
Marshall Copeland
Moving Hadoop to the Cloud
Bill Havanki
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Personal Cybersecurity
Marvin Waschke
Practical Machine Learning with H2O
Darren Cook
Effective DevOps
Jennifer Davis & Ryn Daniels
Clojure for the Brave and True
Daniel Higginbotham
Python Playground
Mahesh Venkitachalam
Cisco Networking Essentials
Troy McMillan
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
CompTIA Network+™ Study Guide
Todd Lammle
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Network Attacks and Exploitation
Matthew Monte
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
MCSA Windows Server® 2012 R2
William Panek
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Time Series Databases
Ted Dunning & Ellen Friedman
Think Stats
Allen B. Downey
Data Science at the Command Line
Jeroen Janssens
If Hemingway Wrote JavaScript
Angus Croll
Practical Machine Learning