Learning DevSecOps
Steve Suehring
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Foundations of Scalable Systems
Ian Gorton
Test-Driven Development in Go
Adelina Simion
Data Science at the Command Line
Jeroen Janssens
Head First Data Analysis
Michael Milton
Doing Data Science
Cathy O’Neil & Rachel Schutt
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
CompTIA Network+™ Study Guide
Todd Lammle
Data Storage Networking
Nigel Poulton
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Microsoft Windows Networking Essentials
Darril Gibson
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Cisco Networking Essentials
Troy McMillan
MCSA Windows Server® 2012 R2
William Panek
Network Attacks and Exploitation
Matthew Monte
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
AWS System Administration
Mike Ryan & Federico Lucifredi
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Designing Distributed Systems
Brendan Burns
Prometheus: Up & Running
Brian Brazil
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Practical Monitoring
Mike Julian
Linux Pocket Guide
Daniel J. Barrett
Seeking SRE
David N. Blank-Edelman
Effective DevOps
Jennifer Davis & Ryn Daniels
Moving Hadoop to the Cloud
Bill Havanki
Database Reliability Engineering
Laine Campbell & Charity Majors
Deploying to OpenShift
Graham Dumpleton
Jenkins 2: Up and Running
Brent Laster
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Metasploit for Beginners
Sagar Rahalkar
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Industrial Cybersecurity
Pascal Ackerman
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Mastering pfSense, Second Edition
David Zientara
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Becoming the Hacker
Adrian Pruteanu
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Hands-On Red Team Tactics
Learning Malware Analysis
MONNAPPA K A
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Practical Cyber Intelligence
Wilson Bautista
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Cyber Security on Azure
Marshall Copeland
Waging Cyber War
Jacob G. Oakley
Professional Red Teaming
Privileged Attack Vectors
Morey J. Haber
Cybersecurity for Space