Network Attacks and Exploitation
Matthew Monte
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Computer Science from teh bottom up
Unknown
Software Architecture Patterns
Mark Richards
Think Bayes
Allen B. Downey
Think Like a Programmer
V. Anton Spraul
Think Stats
Threat Modeling
Izar Tarandach and Matthew J. Coles
Time Series Databases
Ted Dunning & Ellen Friedman
Transitioning to Java
Ken Fogel
Waging Cyber War
Jacob G. Oakley
Web Application Security
Andrew Hoffman
Write Great Code, Volume 1, 2nd Edition
Randall Hyde
Write Great Code (1)
Write Great Code, Volume 2, 2nd Edition
Write Great Code (2)
Writing API Tests with Karate
Benjamin Bischoff
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth