Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Practical Machine Learning with H2O
Darren Cook
Head First Data Analysis
Michael Milton
Practical Cyber Forensics
Niranjan Reddy
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Personal Cybersecurity
Marvin Waschke
Cybersecurity Incident Response
Eric C. Thompson
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Advanced API Security
Prabath Siriwardena
PCI DSS
Jim Seaman
Firewalls Don't Stop Dragons
Carey Parker
Cybersecurity for Space
Jacob G. Oakley
Professional Red Teaming
Waging Cyber War
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Securing Office 365
Matthew Katzer
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Privileged Attack Vectors
Morey J. Haber
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cyber Security on Azure
Marshall Copeland