Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Practical Linux System Administration
Kenneth Hess
Quantum Computing Algorithms
Barry Burd
Learning Malware Analysis
MONNAPPA K A
Industrial Cybersecurity
Pascal Ackerman
40 Algorithms Every Programmer Should Know
Imran Ahmad
Practical Cyber Intelligence
Wilson Bautista
Writing API Tests with Karate
Benjamin Bischoff
Hands-On Penetration Testing on Windows
Phil Bramwell
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Crystal Programming
George Dietrich & Guilherme Bernal
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Polished Ruby Programming
Jeremy Evans
How to Test a Time Machine
Noemí Ferrera
Transitioning to Java
Ken Fogel
Delphi High Performance
Primož Gabrijelčič
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Fundamentals for Self-Taught Programmers
Jasmine Greenaway
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Systems Engineering Demystified, Second Edition
Jon Holt
Get Your Hands Dirty on Clean Architecture
Tom Hombergs
gRPC Go for Professionals
Clément Jean
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Digital Transformation and Modernization with IBM API Connect
Bryon Kataoka & James Brennan & Ashish Aggarwal & Matt Roberts
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Embedded Systems Architecture
Daniele Lacamera
Test-Driven Development with Java
Alan Mellor
Open Source Projects - Beyond Code
John Mertic
Building Modern CLI Applications in Go
Marian Montagnino
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
The Art of Writing Efficient Programs
Fedor G. Pikus
Becoming the Hacker
Adrian Pruteanu
Java Memory Management
Maaike van Putten & Sean Kennedy
Metasploit for Beginners
Sagar Rahalkar
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Test Automation Engineering Handbook
Manikandan Sambamurthy
Learn Java 17 Programming, Second Edition
Nick Samoylov
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Hands-On Red Team Tactics
Himanshu Sharma
Kali Linux - An Ethical Hacker's Cookbook
Test-Driven Development in Go
Adelina Simion
Event-Driven Architecture in Golang
Michael Stack
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Technical Program Manager’s Handbook
Joshua Alan Teter
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Developer Career Masterplan
Heather VanCura & Bruno Souza
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Practical Design Patterns for Java Developers
Miroslav Wengner
Mastering pfSense, Second Edition
David Zientara