Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Security as Code
BK Sarthas Das and Virginia Chu
Cyber Security on Azure
Marshall Copeland
Efficient Linux at the Command Line
Daniel J. Barrett
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
The Art of Writing Efficient Programs
Fedor G. Pikus
Security and Microservice Architecture on AWS
Gaurav Raje
Industrial Cybersecurity
Pascal Ackerman
Polished Ruby Programming
Jeremy Evans
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Threat Modeling
Izar Tarandach and Matthew J. Coles
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Privileged Attack Vectors
Morey J. Haber
40 Algorithms Every Programmer Should Know
Imran Ahmad
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
PCI DSS
Jim Seaman
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Cybersecurity for Space
Jacob G. Oakley
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Waging Cyber War
Practical Cyber Forensics
Niranjan Reddy
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Professional Red Teaming
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Becoming the Hacker
Adrian Pruteanu
Securing Office 365
Matthew Katzer
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Cybersecurity Incident Response
Eric C. Thompson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Firewalls Don't Stop Dragons
Carey Parker
Seeking SRE
David N. Blank-Edelman
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Prometheus: Up & Running
Brian Brazil
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Mastering pfSense, Second Edition
David Zientara
Jenkins 2: Up and Running
Brent Laster
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Cyber Intelligence
Wilson Bautista
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Designing Distributed Systems
Brendan Burns
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Kali Linux - An Ethical Hacker's Cookbook
Advanced API Security
Prabath Siriwardena
Metasploit for Beginners
Sagar Rahalkar
Moving Hadoop to the Cloud
Bill Havanki