Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Privileged Attack Vectors
Morey J. Haber
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Mastering pfSense, Second Edition
David Zientara
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Business School For Startups
Fred Wilson
Practical Design Patterns for Java Developers
Miroslav Wengner
Enabling Microservice Success
Sarah Wells
Personal Cybersecurity
Marvin Waschke
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Developer Career Masterplan
Heather VanCura & Bruno Souza
Flow Architectures
James Urquhart
Knockout.js Succinctly
Unknown
Data Structures Succinctly Part 2
Data Structures Succinctly (2)
Computer Science from teh bottom up
Hands-on Approach to Modern Quantum Algorithms
Cybersecurity Incident Response
Eric C. Thompson
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Technical Program Manager’s Handbook
Joshua Alan Teter
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Learning DevSecOps
Steve Suehring
Event-Driven Architecture in Golang
Michael Stack
Advanced API Security
Prabath Siriwardena
Test-Driven Development in Go
Adelina Simion
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
The Art of Agile Development
James Shore
Guide To YC
Jason Shen
GIS Succinctly
Peter Shaw
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Red Team Tactics
PCI DSS
Jim Seaman
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
Learn Java 17 Programming, Second Edition
Nick Samoylov
Test Automation Engineering Handbook
Manikandan Sambamurthy
AWS System Administration
Mike Ryan & Federico Lucifredi
Practical Process Automation
Bernd Ruecker
Software Architecture Patterns
Mark Richards
Communication Patterns
Jacqui Read
Metasploit for Beginners
Sagar Rahalkar
Java Memory Management
Maaike van Putten & Sean Kennedy
Data Storage Networking
Nigel Poulton
F# Succinctly
Robert Pickering
Firewalls Don't Stop Dragons
Carey Parker
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
MCSA Windows Server® 2012 R2
William Panek
Doing Data Science
Cathy O’Neil & Rachel Schutt
Waging Cyber War
Jacob G. Oakley
Cybersecurity for Space
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Building Microservices
Sam Newman
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Network Attacks and Exploitation
Matthew Monte