Practical Cyber Intelligence
Wilson Bautista
Learning GitHub Actions
Brent Laster
Practical Design Patterns for Java Developers
Miroslav Wengner
Industrial Cybersecurity
Pascal Ackerman
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Building Microservices
Sam Newman
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Cybersecurity for Space
Jacob G. Oakley
Professional Red Teaming
Waging Cyber War
Doing Data Science
Cathy O’Neil & Rachel Schutt
MCSA Windows Server® 2012 R2
William Panek
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Firewalls Don't Stop Dragons
Carey Parker
F# Succinctly
Robert Pickering
The Art of Writing Efficient Programs
Fedor G. Pikus
Data Storage Networking
Nigel Poulton
Becoming the Hacker
Adrian Pruteanu
Java Memory Management
Maaike van Putten & Sean Kennedy
Metasploit for Beginners
Sagar Rahalkar
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Security and Microservice Architecture on AWS
Gaurav Raje
Policy as Code
Jimmy Ray
Communication Patterns
Jacqui Read
Practical Cyber Forensics
Niranjan Reddy
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Software Architecture Patterns
Mark Richards
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Practical Process Automation
Bernd Ruecker
AWS System Administration
Mike Ryan & Federico Lucifredi
Test Automation Engineering Handbook
Manikandan Sambamurthy
Learn Java 17 Programming, Second Edition
Nick Samoylov
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
PCI DSS
Jim Seaman
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Hands-On Red Team Tactics
Himanshu Sharma
Kali Linux - An Ethical Hacker's Cookbook
GIS Succinctly
Peter Shaw
Guide To YC
Jason Shen
The Art of Agile Development
James Shore
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Test-Driven Development in Go
Adelina Simion
Advanced API Security
Prabath Siriwardena
Think Like a Programmer
V. Anton Spraul
Event-Driven Architecture in Golang
Michael Stack
Learning DevSecOps
Steve Suehring
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Technical Program Manager’s Handbook
Joshua Alan Teter
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Cybersecurity Incident Response
Eric C. Thompson
Hands-on Approach to Modern Quantum Algorithms
Unknown
Computer Science from teh bottom up
Knockout.js Succinctly
Data Structures Succinctly Part 2
Data Structures Succinctly (2)
Flow Architectures
James Urquhart
Developer Career Masterplan
Heather VanCura & Bruno Souza