Microsoft Windows Networking Essentials
Darril Gibson
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Quantum Computing Algorithms
Barry Burd
Learn You a Haskell for Great Good!
Miran Lipovaca
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Network Attacks and Exploitation
Matthew Monte
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Moving Hadoop to the Cloud
Bill Havanki
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Metasploit for Beginners
Sagar Rahalkar
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Mastering pfSense, Second Edition
David Zientara
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Linux Pocket Guide
Daniel J. Barrett
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Learning Systems Thinking
Diana Montalion
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Learning Modern Linux
Michael Hausenblas
Learning Malware Analysis
MONNAPPA K A
Learning Kali Linux
Ric Messier
Learning GitHub Actions
Brent Laster
Learning Domain-Driven Design
Vlad Khononov
Learning DevSecOps
Steve Suehring
Learn You Some Erlang For Great Good!
Fred Hebert
Learn Java 17 Programming, Second Edition
Nick Samoylov
Land of Lisp
Conrad Barski M.D.
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Jenkins 2: Up and Running
Java Memory Management
Maaike van Putten & Sean Kennedy
Intelligent Continuous Security
Marc Hornbeek
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Inside Cyber Warfare
Jeffrey Caruso
Industrial Cybersecurity
Pascal Ackerman
If Hemingway Wrote JavaScript
Angus Croll
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Identity Attack Vectors
Morey J. Haber & Darran Rolls
How to Test a Time Machine
Noemí Ferrera
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Head First Data Analysis
Michael Milton
Hands-On Red Team Tactics
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-on Approach to Modern Quantum Algorithms
Unknown
gRPC Go for Professionals
Clément Jean
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Fundamentals for Self-Taught Programmers
Jasmine Greenaway