Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Think Like a Programmer
V. Anton Spraul
Data Science at the Command Line
Jeroen Janssens
Learning DevSecOps
Steve Suehring
Waging Cyber War
Jacob G. Oakley
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Securing Office 365
Matthew Katzer
Professional Red Teaming
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Privileged Attack Vectors
Morey J. Haber
Practical Cyber Forensics
Niranjan Reddy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Personal Cybersecurity
Marvin Waschke
PCI DSS
Jim Seaman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Firewalls Don't Stop Dragons
Carey Parker
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Advanced API Security
Prabath Siriwardena