Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cisco Networking Essentials
Troy McMillan
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
40 Algorithms Every Programmer Should Know
Imran Ahmad
The Art of Writing Efficient Programs
Fedor G. Pikus
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Becoming the Hacker
Adrian Pruteanu
Building Modern CLI Applications in Go
Marian Montagnino
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Crystal Programming
George Dietrich & Guilherme Bernal
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Delphi High Performance
Primož Gabrijelčič
Developer Career Masterplan
Heather VanCura & Bruno Souza
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Embedded Systems Architecture
Daniele Lacamera
Event-Driven Architecture in Golang
Michael Stack
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
gRPC Go for Professionals
Clément Jean
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Red Team Tactics
Himanshu Sharma
How to Test a Time Machine
Noemí Ferrera
Industrial Cybersecurity
Pascal Ackerman
Java Memory Management
Maaike van Putten & Sean Kennedy
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Learn Java 17 Programming, Second Edition
Nick Samoylov
Learning Malware Analysis
MONNAPPA K A
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering pfSense, Second Edition
David Zientara
Metasploit for Beginners
Sagar Rahalkar
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Open Source Projects - Beyond Code
John Mertic
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Polished Ruby Programming
Jeremy Evans
Practical Cyber Intelligence
Wilson Bautista
Practical Design Patterns for Java Developers
Miroslav Wengner
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Quantum Computing Algorithms
Barry Burd
Systems Engineering Demystified, Second Edition
Jon Holt
Technical Program Manager’s Handbook
Joshua Alan Teter
Test Automation Engineering Handbook
Manikandan Sambamurthy
Test-Driven Development in Go
Adelina Simion
Test-Driven Development with Java
Alan Mellor
Transitioning to Java
Ken Fogel
Writing API Tests with Karate
Benjamin Bischoff