Practical Design Patterns for Java Developers
Miroslav Wengner
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
The Art of Writing Efficient Programs
Fedor G. Pikus
Think Like a Programmer
V. Anton Spraul
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Jacob G. Oakley
Cybersecurity Incident Response
Eric C. Thompson
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Firewalls Don't Stop Dragons
Carey Parker
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
PCI DSS
Jim Seaman
Personal Cybersecurity
Marvin Waschke
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Practical Cyber Forensics
Niranjan Reddy
Privileged Attack Vectors
Morey J. Haber
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Professional Red Teaming
Securing Office 365
Matthew Katzer
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Waging Cyber War