Hands-On Penetration Testing on Windows
Phil Bramwell
Practical Machine Learning
Ted Dunning & Ellen Friedman
Software Architecture: The Hard Parts
Mark Richards & Neal Ford & Pramod Sadalage & and Zhamak Dehghani
Software Architecture Patterns
Mark Richards
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Advanced API Security
Prabath Siriwardena
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Firewalls Don't Stop Dragons
Carey Parker
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Securing Office 365
Matthew Katzer
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Cybersecurity for Space
Jacob G. Oakley
Privileged Attack Vectors
Morey J. Haber
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Professional Red Teaming
Waging Cyber War
Cyber Security on Azure
Marshall Copeland
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson