Hands-On Red Team Tactics
Himanshu Sharma
Advanced API Security
Prabath Siriwardena
Quantum Computing Algorithms
Barry Burd
AWS System Administration
Mike Ryan & Federico Lucifredi
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Learn You Some Erlang For Great Good!
Fred Hebert
Practical Machine Learning with H2O
Darren Cook
Think Bayes
Allen B. Downey
Think Stats
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Time Series Databases
Ted Dunning & Ellen Friedman
Practical Machine Learning
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Data Science at the Command Line
Jeroen Janssens
Head First Data Analysis
Michael Milton
Doing Data Science
Cathy O’Neil & Rachel Schutt
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
CompTIA Network+™ Study Guide
Todd Lammle
Data Storage Networking
Nigel Poulton
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Microsoft Windows Networking Essentials
Darril Gibson
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Cisco Networking Essentials
Troy McMillan
MCSA Windows Server® 2012 R2
William Panek
Network Attacks and Exploitation
Matthew Monte
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Designing Distributed Systems
Brendan Burns
Prometheus: Up & Running
Brian Brazil
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Practical Monitoring
Mike Julian
Linux Pocket Guide
Daniel J. Barrett
Seeking SRE
David N. Blank-Edelman
Effective DevOps
Jennifer Davis & Ryn Daniels
Moving Hadoop to the Cloud
Bill Havanki
Database Reliability Engineering
Laine Campbell & Charity Majors
Deploying to OpenShift
Graham Dumpleton
Jenkins 2: Up and Running
Brent Laster
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Kali Linux - An Ethical Hacker's Cookbook
Metasploit for Beginners
Sagar Rahalkar
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Industrial Cybersecurity
Pascal Ackerman
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Mastering pfSense, Second Edition
David Zientara
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Becoming the Hacker
Adrian Pruteanu
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Learning Malware Analysis
MONNAPPA K A
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu