Serverless Development on AWS
Sheen Brisals & Luke Hedger
Art of R Programming
Norman Matloff
Data Storage Networking
Nigel Poulton
Linux Pocket Guide
Daniel J. Barrett
Learn You Some Erlang For Great Good!
Fred Hebert
Practical Machine Learning with H2O
Darren Cook
Think Bayes
Allen B. Downey
Think Stats
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
Time Series Databases
Ted Dunning & Ellen Friedman
Practical Machine Learning
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
Data Science at the Command Line
Jeroen Janssens
Head First Data Analysis
Michael Milton
Doing Data Science
Cathy O’Neil & Rachel Schutt
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
CompTIA Network+™ Study Guide
Todd Lammle
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Microsoft Windows Networking Essentials
Darril Gibson
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Cisco Networking Essentials
Troy McMillan
MCSA Windows Server® 2012 R2
William Panek
Network Attacks and Exploitation
Matthew Monte
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
AWS System Administration
Mike Ryan & Federico Lucifredi
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Designing Distributed Systems
Brendan Burns
Prometheus: Up & Running
Brian Brazil
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Practical Monitoring
Mike Julian
Seeking SRE
David N. Blank-Edelman
Effective DevOps
Jennifer Davis & Ryn Daniels
Moving Hadoop to the Cloud
Bill Havanki
Database Reliability Engineering
Laine Campbell & Charity Majors
Deploying to OpenShift
Graham Dumpleton
Jenkins 2: Up and Running
Brent Laster
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Metasploit for Beginners
Sagar Rahalkar
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Industrial Cybersecurity
Pascal Ackerman
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Mastering pfSense, Second Edition
David Zientara
Digital Forensics and Incident Response - Second Edition
Gerard Johansen
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Hands-On Red Team Tactics
Learning Malware Analysis
MONNAPPA K A
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Dr. Erdal Ozkaya
Practical Cyber Intelligence
Wilson Bautista
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson