Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Enabling Microservice Success
Sarah Wells
Event-Driven Architecture in Golang
Michael Stack
F# Succinctly
Robert Pickering
FastAPI
Bill Lubanovic
Firewalls Don't Stop Dragons
Carey Parker
Flow Architectures
James Urquhart
Foundations of Scalable Systems
Ian Gorton
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
GIS Succinctly
Peter Shaw
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
gRPC Go for Professionals
Clément Jean
Guide To YC
Jason Shen
Hands-on Approach to Modern Quantum Algorithms
Unknown
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Red Team Tactics
Himanshu Sharma
Head First Data Analysis
Michael Milton
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
How to Test a Time Machine
Noemí Ferrera
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
If Hemingway Wrote JavaScript
Angus Croll
Industrial Cybersecurity
Pascal Ackerman
Inside Cyber Warfare
Jeffrey Caruso
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Intelligent Continuous Security
Marc Hornbeek
Java Memory Management
Maaike van Putten & Sean Kennedy
JavaScript Succinctly
Cody Lindley
Jenkins 2: Up and Running
Brent Laster
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Knockout.js Succinctly
Land of Lisp
Conrad Barski M.D.
Learn Java 17 Programming, Second Edition
Nick Samoylov
Learn You a Haskell for Great Good!
Miran Lipovaca
Learn You Some Erlang For Great Good!
Fred Hebert
Learning DevSecOps
Steve Suehring
Learning Domain-Driven Design
Vlad Khononov
Learning GitHub Actions
Learning Kali Linux
Ric Messier
Learning Malware Analysis
MONNAPPA K A
Learning Modern Linux
Michael Hausenblas
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Learning Systems Thinking
Diana Montalion
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Linux Pocket Guide
Daniel J. Barrett
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering pfSense, Second Edition
David Zientara
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett