Writing API Tests with Karate
Benjamin Bischoff
Learn You Some Erlang For Great Good!
Fred Hebert
Software Supply Chain Security
Cassie Crossley
Professional Red Teaming
Jacob G. Oakley
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Write Great Code, Volume 1, 2nd Edition
Write Great Code (1)
Web Application Security
Andrew Hoffman
Waging Cyber War
Transitioning to Java
Ken Fogel
Time Series Databases
Ted Dunning & Ellen Friedman
Threat Modeling
Izar Tarandach and Matthew J. Coles
Think Stats
Allen B. Downey
Think Like a Programmer
V. Anton Spraul
Think Bayes
Test-Driven Development with Java
Alan Mellor
Test-Driven Development in Go
Adelina Simion
Test Automation Engineering Handbook
Manikandan Sambamurthy
Terraform: Up and Running
Yevgeniy Brikman
Technology Strategy Patterns
Eben Hewitt
Technical Program Manager’s Handbook
Joshua Alan Teter
Systems Engineering Demystified, Second Edition
Jon Holt
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Software Architecture Patterns
Mark Richards
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
The Software Architect Elevator
Gregor Hohpe
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Seeking SRE
David N. Blank-Edelman
Security as Code
BK Sarthas Das and Virginia Chu
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Security and Microservice Architecture on AWS
Gaurav Raje
Securing Office 365
Matthew Katzer
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
Quantum Computing Algorithms
Barry Burd
Python Playground
Mahesh Venkitachalam
Prometheus: Up & Running
Brian Brazil
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Privileged Attack Vectors
Morey J. Haber
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Practical Process Automation
Bernd Ruecker
Practical Monitoring
Mike Julian
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Practical Machine Learning with H2O
Darren Cook
Practical Machine Learning
Practical Linux System Administration
Kenneth Hess
Practical Design Patterns for Java Developers
Miroslav Wengner
Practical Cyber Intelligence
Wilson Bautista
Practical Cyber Forensics
Niranjan Reddy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Practical Cloud Security
Chris Dotson
Polished Ruby Programming
Jeremy Evans
Policy as Code
Jimmy Ray
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Personal Cybersecurity
Marvin Waschke
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
PCI DSS
Jim Seaman
Open Source Projects - Beyond Code
John Mertic
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi