Practical Design Patterns for Java Developers
Miroslav Wengner
Enabling Microservice Success
Sarah Wells
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Test-Driven Development with Java
Alan Mellor
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Metasploit for Beginners
Sagar Rahalkar
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Mastering pfSense, Second Edition
David Zientara
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Linux Pocket Guide
Daniel J. Barrett
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Learning Systems Thinking
Diana Montalion
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Learning Modern Linux
Michael Hausenblas
Learning Malware Analysis
MONNAPPA K A
Learning GitHub Actions
Brent Laster
Learning Domain-Driven Design
Vlad Khononov
Learning DevSecOps
Steve Suehring
Learn You Some Erlang For Great Good!
Fred Hebert
Learn You a Haskell for Great Good!
Miran Lipovaca
Learn Java 17 Programming, Second Edition
Nick Samoylov
Land of Lisp
Conrad Barski M.D.
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Kelsey Hightower & Brendan Burns & Joe Beda
Knockout.js Succinctly
Unknown
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Jenkins 2: Up and Running
JavaScript Succinctly
Cody Lindley
Java Memory Management
Maaike van Putten & Sean Kennedy
Industrial Cybersecurity
Pascal Ackerman
If Hemingway Wrote JavaScript
Angus Croll
Identity Attack Vectors
Morey J. Haber & Darran Rolls
How to Test a Time Machine
Noemí Ferrera
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Head First Data Analysis
Michael Milton
Hands-On Red Team Tactics
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-on Approach to Modern Quantum Algorithms
Guide To YC
Jason Shen
gRPC Go for Professionals
Clément Jean
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
GIS Succinctly
Peter Shaw
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Foundations of Scalable Systems
Ian Gorton
Flow Architectures
James Urquhart
Firewalls Don't Stop Dragons
Carey Parker
FastAPI
Bill Lubanovic
F# Succinctly
Robert Pickering
Event-Driven Architecture in Golang
Michael Stack
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam