Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Delphi High Performance
Primož Gabrijelčič
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & and Adam Stubblefield
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks
Cloud Native Security Cookbook
Josh Armitage
Efficient Linux at the Command Line
Daniel J. Barrett
Linux Pocket Guide
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Seeking SRE
David N. Blank-Edelman
Prometheus: Up & Running
Brian Brazil
Terraform: Up and Running
Yevgeniy Brikman
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Designing Distributed Systems
Brendan Burns
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Database Reliability Engineering
Laine Campbell & Charity Majors
Inside Cyber Warfare
Jeffrey Caruso
Security as Code
BK Sarthas Das and Virginia Chu
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Threat Modeling
Izar Tarandach and Matthew J. Coles
Practical Machine Learning with H2O
Darren Cook
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Software Supply Chain Security
Cassie Crossley
Effective DevOps
Jennifer Davis & Ryn Daniels
Practical Cloud Security
Chris Dotson
Think Stats
Allen B. Downey
Think Bayes
Practical Machine Learning
Ted Dunning & Ellen Friedman
Time Series Databases
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Learning Modern Linux
Michael Hausenblas
Moving Hadoop to the Cloud
Bill Havanki
Practical Linux System Administration
Kenneth Hess
Web Application Security
Andrew Hoffman
Intelligent Continuous Security
Marc Hornbeek
Data Science at the Command Line
Jeroen Janssens
Practical Monitoring
Mike Julian
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Attack Surface Management
Ron Eddings and MJ Kaufmann
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Jenkins 2: Up and Running
Brent Laster
Learning GitHub Actions
FastAPI
Bill Lubanovic
Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Learning Kali Linux
Ric Messier
Head First Data Analysis
Michael Milton
Doing Data Science
Cathy O’Neil & Rachel Schutt
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Security and Microservice Architecture on AWS
Gaurav Raje
Policy as Code
Jimmy Ray
Intelligence-Driven Incident Response
Rebekah Brown and Scott J. Roberts
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
AWS System Administration
Mike Ryan & Federico Lucifredi
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Learning DevSecOps
Steve Suehring
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
The Developer’s Playbook for Large Language Model Security
Steve Wilson
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn