Ansible: Up and Running
Bas Meijer & Lorin Hochstein & Rene Moser
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
The Software Architect Elevator
Gregor Hohpe
Mastering API Architecture
James Gough & Daniel Bryant & and Matthew Auburn
Foundations of Scalable Systems
Ian Gorton
Building Multi-Tenant SaaS Architectures
Tod Golding
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Microsoft Windows Networking Essentials
Darril Gibson
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Head First Software Architecture
Raju Gandhi & Mark Richards & Neal Ford
Delphi High Performance
Primož Gabrijelčič
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Building Evolutionary Architectures
Neal Ford & Rebecca Parsons & Patrick Kua & and Pramod Sadalage
Fundamentals of Software Architecture
Mark Richards and Neal Ford
Transitioning to Java
Ken Fogel
How to Test a Time Machine
Noemí Ferrera
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
The Book of F#: Breaking Free with Managed Functional Programming
Dave Fancher
Polished Ruby Programming
Jeremy Evans
Time Series Databases
Ted Dunning & Ellen Friedman
Practical Machine Learning
Deploying to OpenShift
Graham Dumpleton
Think Bayes
Allen B. Downey
Think Stats
Practical Cloud Security
Chris Dotson
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Crystal Programming
George Dietrich & Guilherme Bernal
Effective DevOps
Jennifer Davis & Ryn Daniels
Software Supply Chain Security
Cassie Crossley
If Hemingway Wrote JavaScript
Angus Croll
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Cyber Security on Azure
Marshall Copeland
Practical Machine Learning with H2O
Darren Cook
Threat Modeling
Izar Tarandach and Matthew J. Coles
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
Security as Code
BK Sarthas Das and Virginia Chu
Inside Cyber Warfare
Jeffrey Caruso
Database Reliability Engineering
Laine Campbell & Charity Majors
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & and Lachlan Evenson
Designing Distributed Systems
Brendan Burns
Quantum Computing Algorithms
Barry Burd
Security Architecture for Hybrid Cloud
Mark Buckwell & Stefaan Van daele & and Carsten Horst
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Terraform: Up and Running
Yevgeniy Brikman
Prometheus: Up & Running
Brian Brazil
Hands-On Penetration Testing on Windows
Phil Bramwell
Seeking SRE
David N. Blank-Edelman
Writing API Tests with Karate
Benjamin Bischoff
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Defensive Security Handbook
Amanda Berlin & Lee Brotherston & and William F. Reyor III
Building an Event-Driven Data Mesh
Adam Bellemare
Building Event-Driven Microservices
Practical Cyber Intelligence
Wilson Bautista
Linux Pocket Guide
Daniel J. Barrett
Efficient Linux at the Command Line
Effective Programming
Jeff Atwood
Cloud Native Security Cookbook
Josh Armitage
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Building a Cyber Risk Management Program
Brian Allen & Brandon Bapst & and Terry Allan Hicks