Firewalls Don't Stop Dragons
Carey Parker
Continuous API Management
Mehdi Medjaoui & Erik Wilde & Ronnie Mitra & and Mike Amundsen
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Business School For Startups
Fred Wilson
GIS Succinctly
Peter Shaw
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Foundations of Scalable Systems
Ian Gorton
Flow Architectures
James Urquhart
FastAPI
Bill Lubanovic
F# Succinctly
Robert Pickering
Event-Driven Architecture in Golang
Michael Stack
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Enabling Microservice Success
Sarah Wells
Embedded Systems Architecture
Daniele Lacamera
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Efficient Linux at the Command Line
Daniel J. Barrett
Effective Programming
Jeff Atwood
Effective DevOps
Jennifer Davis & Ryn Daniels
Doing Data Science
Cathy O’Neil & Rachel Schutt
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Developer Career Masterplan
Heather VanCura & Bruno Souza
Designing Distributed Systems
Brendan Burns
Deploying to OpenShift
Graham Dumpleton
Delphi High Performance
Primož Gabrijelčič
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Database Reliability Engineering
Laine Campbell & Charity Majors
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Storage Networking
Nigel Poulton
Data Science at the Command Line
Jeroen Janssens
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity for Space
Jacob G. Oakley
Cyber Security on Azure
Marshall Copeland
Crystal Programming
George Dietrich & Guilherme Bernal
Computer Science from teh bottom up
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
CompTIA Network+™ Study Guide
Todd Lammle
Communication Patterns
Jacqui Read
Cloud Native Security Cookbook
Josh Armitage
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Clojure for the Brave and True
Daniel Higginbotham
Cisco Networking Essentials
Troy McMillan
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Building Multi-Tenant SaaS Architectures
Tod Golding
Building Modern CLI Applications in Go
Marian Montagnino
Building Microservices
Sam Newman
Building Evolutionary Architectures
Neal Ford & Rebecca Parsons & Patrick Kua & and Pramod Sadalage
Building Event-Driven Microservices
Adam Bellemare
Building an Event-Driven Data Mesh
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Becoming the Hacker
Adrian Pruteanu
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams