Systems Engineering Demystified, Second Edition
Jon Holt
Cybersecurity Incident Response
Eric C. Thompson
Crystal Programming
George Dietrich & Guilherme Bernal
Developer Career Masterplan
Heather VanCura & Bruno Souza
CompTIA Network+™ Study Guide
Todd Lammle
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Cisco Networking Essentials
Troy McMillan
Python Playground
Mahesh Venkitachalam
Clojure for the Brave and True
Daniel Higginbotham
Effective DevOps
Jennifer Davis & Ryn Daniels
Practical Machine Learning with H2O
Darren Cook
Personal Cybersecurity
Marvin Waschke
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
F# Succinctly
Robert Pickering
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Moving Hadoop to the Cloud
Bill Havanki
Cyber Security on Azure
Marshall Copeland
Metasploit for Beginners
Sagar Rahalkar
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Advanced API Security
Prabath Siriwardena
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Designing Distributed Systems
Brendan Burns
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Practical Cyber Intelligence
Wilson Bautista
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Jenkins 2: Up and Running
Brent Laster
Mastering pfSense, Second Edition
David Zientara
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Prometheus: Up & Running
Brian Brazil
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
AWS System Administration
Mike Ryan & Federico Lucifredi
Seeking SRE
David N. Blank-Edelman
Firewalls Don't Stop Dragons
Carey Parker
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Hands-On Red Team Tactics
Learning Malware Analysis
MONNAPPA K A
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Securing Office 365
Matthew Katzer
Becoming the Hacker
Adrian Pruteanu
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Professional Red Teaming
Jacob G. Oakley
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cyber Forensics
Niranjan Reddy
Waging Cyber War
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Web Application Security
Andrew Hoffman
Cybersecurity for Space
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
PCI DSS
Jim Seaman