Quantum Computing Algorithms
Barry Burd
Threat Modeling
Izar Tarandach and Matthew J. Coles
Effective DevOps
Jennifer Davis & Ryn Daniels
Business School For Startups
Fred Wilson
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Attack Surface Management
Ron Eddings and MJ Kaufmann
AWS System Administration
Mike Ryan & Federico Lucifredi
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Cloud Native Security Cookbook
Josh Armitage
Data Science at the Command Line
Jeroen Janssens
Database Reliability Engineering
Laine Campbell & Charity Majors
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Designing Distributed Systems
Brendan Burns
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Doing Data Science
Cathy O’Neil & Rachel Schutt
Efficient Linux at the Command Line
Daniel J. Barrett
FastAPI
Bill Lubanovic
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Head First Data Analysis
Michael Milton
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Inside Cyber Warfare
Jeffrey Caruso
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Intelligent Continuous Security
Marc Hornbeek
Jenkins 2: Up and Running
Brent Laster
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Learning DevSecOps
Steve Suehring
Learning GitHub Actions
Learning Kali Linux
Ric Messier
Learning Modern Linux
Michael Hausenblas
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Linux Pocket Guide
Moving Hadoop to the Cloud
Bill Havanki
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Policy as Code
Jimmy Ray
Practical Cloud Security
Chris Dotson
Practical Linux System Administration
Kenneth Hess
Practical Machine Learning
Ted Dunning & Ellen Friedman
Practical Machine Learning with H2O
Darren Cook
Practical Monitoring
Mike Julian
Prometheus: Up & Running
Brian Brazil
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Security and Microservice Architecture on AWS
Gaurav Raje
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Security as Code
BK Sarthas Das and Virginia Chu
Seeking SRE
David N. Blank-Edelman
Serverless Development on AWS
Sheen Brisals & Luke Hedger
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Software Supply Chain Security
Cassie Crossley
Terraform: Up and Running
Yevgeniy Brikman
Think Bayes
Allen B. Downey
Think Stats
Time Series Databases
Web Application Security
Andrew Hoffman
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth