AWS System Administration
Mike Ryan & Federico Lucifredi
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Crystal Programming
George Dietrich & Guilherme Bernal
Test-Driven Development with Java
Alan Mellor
40 Algorithms Every Programmer Should Know
Imran Ahmad
Hands-on Approach to Modern Quantum Algorithms
Unknown
The Art of Writing Efficient Programs
Fedor G. Pikus
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Building Modern CLI Applications in Go
Marian Montagnino
Delphi High Performance
Primož Gabrijelčič
Developer Career Masterplan
Heather VanCura & Bruno Souza
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Embedded Systems Architecture
Daniele Lacamera
Event-Driven Architecture in Golang
Michael Stack
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
gRPC Go for Professionals
Clément Jean
How to Test a Time Machine
Noemí Ferrera
Java Memory Management
Maaike van Putten & Sean Kennedy
Learn Java 17 Programming, Second Edition
Nick Samoylov
Open Source Projects - Beyond Code
John Mertic
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Polished Ruby Programming
Jeremy Evans
Practical Design Patterns for Java Developers
Miroslav Wengner
Quantum Computing Algorithms
Barry Burd
Systems Engineering Demystified, Second Edition
Jon Holt
Technical Program Manager’s Handbook
Joshua Alan Teter
Test Automation Engineering Handbook
Manikandan Sambamurthy
Test-Driven Development in Go
Adelina Simion
Transitioning to Java
Ken Fogel
Writing API Tests with Karate
Benjamin Bischoff
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Advanced API Security
Prabath Siriwardena
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Firewalls Don't Stop Dragons
Carey Parker
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Securing Office 365
Matthew Katzer
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Cybersecurity for Space
Jacob G. Oakley
Privileged Attack Vectors
Morey J. Haber
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Professional Red Teaming
Waging Cyber War
Cyber Security on Azure
Marshall Copeland
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cyber Intelligence
Wilson Bautista
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Becoming the Hacker
Adrian Pruteanu
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram