Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Writing API Tests with Karate
Benjamin Bischoff
Building Modern CLI Applications in Go
Marian Montagnino
MCSA Windows Server® 2012 R2
William Panek
Personal Cybersecurity
Marvin Waschke
Cyber Security on Azure
Marshall Copeland
Advanced API Security
Prabath Siriwardena
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Firewalls Don't Stop Dragons
Carey Parker
Cybersecurity Incident Response
Eric C. Thompson
Securing Office 365
Matthew Katzer
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Professional Red Teaming
Jacob G. Oakley
Practical Cyber Forensics
Niranjan Reddy
Waging Cyber War
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Cybersecurity for Space
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber