Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Practical Cyber Forensics
Niranjan Reddy
Technology Strategy Patterns
Eben Hewitt
Cybersecurity for Space
Jacob G. Oakley
Waging Cyber War
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Securing Office 365
Matthew Katzer
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Learning Malware Analysis
MONNAPPA K A
Hands-On Red Team Tactics
Himanshu Sharma
Cybersecurity Incident Response
Eric C. Thompson
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Firewalls Don't Stop Dragons
Carey Parker
Seeking SRE
David N. Blank-Edelman
AWS System Administration
Mike Ryan & Federico Lucifredi
Hands-On Penetration Testing on Windows
Phil Bramwell
Hands-On Cybersecurity for Architects
Neil Rerup & Milad Aslaner
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Prometheus: Up & Running
Brian Brazil
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Mastering pfSense, Second Edition
David Zientara
Jenkins 2: Up and Running
Brent Laster
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Practical Cyber Intelligence
Wilson Bautista
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Designing Distributed Systems
Brendan Burns
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Database Reliability Engineering
Laine Campbell & Charity Majors
Practical Monitoring
Mike Julian
Kali Linux - An Ethical Hacker's Cookbook
Advanced API Security
Prabath Siriwardena
Kubernetes: Up and Running
Kelsey Hightower & Brendan Burns & Joe Beda
Metasploit for Beginners
Sagar Rahalkar
Cyber Security on Azure
Marshall Copeland
Moving Hadoop to the Cloud
Bill Havanki
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
F# Succinctly
Robert Pickering
Personal Cybersecurity
Marvin Waschke
Practical Machine Learning with H2O
Darren Cook
Effective DevOps
Jennifer Davis & Ryn Daniels
Clojure for the Brave and True
Daniel Higginbotham
Cisco Networking Essentials
Troy McMillan
Graph Databases
Ian Robinson & Jim Webber & Emil Eifrem
CompTIA Network+™ Study Guide
Todd Lammle
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Network Attacks and Exploitation
Matthew Monte
Learning Spark
Holden Karau & Andy Konwinski & Patrick Wendell & Matei Zaharia
MCSA Windows Server® 2012 R2
William Panek
Eloquent JavaScript: A Modern Introduction to Programming
Marijn Haverbeke
Time Series Databases
Ted Dunning & Ellen Friedman
Think Stats
Allen B. Downey
Data Science at the Command Line
Jeroen Janssens
If Hemingway Wrote JavaScript
Angus Croll
Practical Machine Learning
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett
Mastering Hyper-V 2012 R2 with System Center and Windows Azure
John Savill
Data Storage Networking
Nigel Poulton