Get Your Hands Dirty on Clean Architecture
Tom Hombergs
Attack Surface Management
Ron Eddings and MJ Kaufmann
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Learning Malware Analysis
MONNAPPA K A
Industrial Cybersecurity
Pascal Ackerman
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
40 Algorithms Every Programmer Should Know
Imran Ahmad
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Cloud Native Security Cookbook
Josh Armitage
Effective Programming
Jeff Atwood
Efficient Linux at the Command Line
Daniel J. Barrett
Linux Pocket Guide
Practical Cyber Intelligence
Wilson Bautista
Building Event-Driven Microservices
Adam Bellemare
Building an Event-Driven Data Mesh
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Writing API Tests with Karate
Benjamin Bischoff
Seeking SRE
David N. Blank-Edelman
Hands-On Penetration Testing on Windows
Phil Bramwell
Prometheus: Up & Running
Brian Brazil
Terraform: Up and Running
Yevgeniy Brikman
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Quantum Computing Algorithms
Barry Burd
Designing Distributed Systems
Brendan Burns
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Database Reliability Engineering
Laine Campbell & Charity Majors
Inside Cyber Warfare
Jeffrey Caruso
Security as Code
BK Sarthas Das and Virginia Chu
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Threat Modeling
Izar Tarandach and Matthew J. Coles
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Practical Machine Learning with H2O
Darren Cook
Cyber Security on Azure
Marshall Copeland
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
If Hemingway Wrote JavaScript
Angus Croll
Software Supply Chain Security
Cassie Crossley
Effective DevOps
Jennifer Davis & Ryn Daniels
Crystal Programming
George Dietrich & Guilherme Bernal
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Practical Cloud Security
Chris Dotson
Think Stats
Allen B. Downey
Think Bayes
Deploying to OpenShift
Graham Dumpleton
Practical Machine Learning
Ted Dunning & Ellen Friedman
Time Series Databases
Polished Ruby Programming
Jeremy Evans
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
How to Test a Time Machine
Noemí Ferrera
Transitioning to Java
Ken Fogel
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Building Evolutionary Architectures
Neal Ford & Rebecca Parsons & Patrick Kua & and Pramod Sadalage
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Delphi High Performance
Primož Gabrijelčič
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Cloud Native Infrastructure
Justin Garrison & Kris Nova