Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Building Multi-Tenant SaaS Architectures
Tod Golding
The Official CompTIA Security+ Self-Paced Study Guide (Exam ...
CompTIA
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Network Attacks and Exploitation
Matthew Monte
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Moving Hadoop to the Cloud
Bill Havanki
Microsoft Windows Networking Essentials
Darril Gibson
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Metasploit for Beginners
Sagar Rahalkar
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Mastering pfSense, Second Edition
David Zientara
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Linux Pocket Guide
Daniel J. Barrett
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Learning Systems Thinking
Diana Montalion
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Learning Modern Linux
Michael Hausenblas
Learning Malware Analysis
MONNAPPA K A
Learning Kali Linux
Ric Messier
Learning GitHub Actions
Brent Laster
Learning Domain-Driven Design
Vlad Khononov
Learning DevSecOps
Steve Suehring
Learn You Some Erlang For Great Good!
Fred Hebert
Learn You a Haskell for Great Good!
Miran Lipovaca
Learn Java 17 Programming, Second Edition
Nick Samoylov
Land of Lisp
Conrad Barski M.D.
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Knockout.js Succinctly
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Jenkins 2: Up and Running
JavaScript Succinctly
Cody Lindley
Java Memory Management
Maaike van Putten & Sean Kennedy
Intelligent Continuous Security
Marc Hornbeek
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Inside Cyber Warfare
Jeffrey Caruso
Industrial Cybersecurity
Pascal Ackerman
If Hemingway Wrote JavaScript
Angus Croll
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Identity Attack Vectors
Morey J. Haber & Darran Rolls
How to Test a Time Machine
Noemí Ferrera
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Head First Data Analysis
Michael Milton
Hands-On Red Team Tactics
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-on Approach to Modern Quantum Algorithms
Guide To YC
Jason Shen
gRPC Go for Professionals
Clément Jean
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem