Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Metasploit for Beginners
Sagar Rahalkar
Java Memory Management
Maaike van Putten & Sean Kennedy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Waging Cyber War
Jacob G. Oakley
Practical Cyber Forensics
Niranjan Reddy
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Professional Red Teaming
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Becoming the Hacker
Adrian Pruteanu
Securing Office 365
Matthew Katzer
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Cybersecurity Incident Response
Eric C. Thompson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Firewalls Don't Stop Dragons
Carey Parker
Seeking SRE
David N. Blank-Edelman
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Penetration Testing on Windows
Phil Bramwell
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Prometheus: Up & Running
Brian Brazil
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Mastering pfSense, Second Edition
David Zientara
Jenkins 2: Up and Running
Brent Laster
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Cyber Intelligence
Wilson Bautista
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Designing Distributed Systems
Brendan Burns
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Advanced API Security
Prabath Siriwardena
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Cyber Security on Azure
Marshall Copeland
Moving Hadoop to the Cloud
Bill Havanki
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
F# Succinctly
Robert Pickering
Personal Cybersecurity
Marvin Waschke
Practical Machine Learning with H2O
Darren Cook
Effective DevOps
Jennifer Davis & Ryn Daniels
Clojure for the Brave and True
Daniel Higginbotham
Python Playground
Mahesh Venkitachalam
Cisco Networking Essentials
Troy McMillan
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
CompTIA Network+™ Study Guide
Todd Lammle
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Network Attacks and Exploitation
Matthew Monte
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
MCSA Windows Server® 2012 R2
William Panek
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Time Series Databases
Ted Dunning & Ellen Friedman
Think Stats
Allen B. Downey