Terraform: Up and Running
Yevgeniy Brikman
Becoming the Hacker
Adrian Pruteanu
Firewalls Don't Stop Dragons
Carey Parker
Learning DevSecOps
Steve Suehring
CompTIA Network+™ Study Guide
Todd Lammle
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Cisco Networking Essentials
Troy McMillan
Python Playground
Mahesh Venkitachalam
Clojure for the Brave and True
Daniel Higginbotham
Effective DevOps
Jennifer Davis & Ryn Daniels
Practical Machine Learning with H2O
Darren Cook
Personal Cybersecurity
Marvin Waschke
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
F# Succinctly
Robert Pickering
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Moving Hadoop to the Cloud
Bill Havanki
Cyber Security on Azure
Marshall Copeland
Metasploit for Beginners
Sagar Rahalkar
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Advanced API Security
Prabath Siriwardena
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Designing Distributed Systems
Brendan Burns
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Practical Cyber Intelligence
Wilson Bautista
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Jenkins 2: Up and Running
Brent Laster
Mastering pfSense, Second Edition
David Zientara
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Prometheus: Up & Running
Brian Brazil
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
AWS System Administration
Mike Ryan & Federico Lucifredi
Seeking SRE
David N. Blank-Edelman
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Cybersecurity Incident Response
Eric C. Thompson
Hands-On Red Team Tactics
Learning Malware Analysis
MONNAPPA K A
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Securing Office 365
Matthew Katzer
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Professional Red Teaming
Jacob G. Oakley
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cyber Forensics
Niranjan Reddy
Waging Cyber War
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Web Application Security
Andrew Hoffman
Cybersecurity for Space
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
PCI DSS
Jim Seaman