F# Succinctly
Robert Pickering
The Site Reliability Workbook
Betsy Beyer & Niall Richard Murphy & David K. Rensin & Kent Kawahara & Stephen Thorne
Effective DevOps
Jennifer Davis & Ryn Daniels
Learn You Some Erlang For Great Good!
Fred Hebert
Writing API Tests with Karate
Benjamin Bischoff
Write Great Code, Volume 2, 2nd Edition
Randall Hyde
Write Great Code (2)
Write Great Code, Volume 1, 2nd Edition
Write Great Code (1)
Web Application Security
Andrew Hoffman
Waging Cyber War
Jacob G. Oakley
Transitioning to Java
Ken Fogel
Time Series Databases
Ted Dunning & Ellen Friedman
Think Stats
Allen B. Downey
Think Bayes
Test-Driven Development with Java
Alan Mellor
Test-Driven Development in Go
Adelina Simion
Test Automation Engineering Handbook
Manikandan Sambamurthy
Terraform: Up and Running
Yevgeniy Brikman
Technology Strategy Patterns
Eben Hewitt
Technical Program Manager’s Handbook
Joshua Alan Teter
Systems Engineering Demystified, Second Edition
Jon Holt
Solving Identity and Access Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Software Architecture Patterns
Mark Richards
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiss & and Eoin Woods
The Software Architect Elevator
Gregor Hohpe
Serverless Development on AWS
Sheen Brisals & Luke Hedger
Seeking SRE
David N. Blank-Edelman
Securing Office 365
Matthew Katzer
Restful Web API Patterns and Practices Cookbook
Mike Amundsen
Realm of Racket: Learn to Program, One Game at a Time!
Matthias Felleisen & Conrad Barski M.D. & David Van Horn & Eight Students of Northeastern University
Quantum Computing Algorithms
Barry Burd
Prometheus: Up & Running
Brian Brazil
Pro Azure Governance and Security
Peter De Tender & Samuel Erskine & David Rendon
Privileged Attack Vectors
Morey J. Haber
The Principles of Object-Oriented Javascript
Nicholas C. Zakas
Practical Process Automation
Bernd Ruecker
Practical Monitoring
Mike Julian
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty
Practical Machine Learning with H2O
Darren Cook
Practical Machine Learning
Practical Linux System Administration
Kenneth Hess
Practical Design Patterns for Java Developers
Miroslav Wengner
Practical Cyber Intelligence
Wilson Bautista
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Polished Ruby Programming
Jeremy Evans
Phishing Dark Waters, The Offensive and Defensive Sides of Malicious ...
Christopher Hadnagy & Michele Fincher
Personal Cybersecurity
Marvin Waschke
Persistence Best Practices for Java Applications
Otávio Santana & Karina Varela
PCI DSS
Jim Seaman
Open Source Projects - Beyond Code
John Mertic
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Network Security Bible
Eric Cole & Ronald L. Krutz & James Conley
Network Programmability and Automation
Christian Adell & Scott S. Lowe & Matt Oswalt
Network Attacks and Exploitation
Matthew Monte
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar & Yogesh Ramdoss & Yoram Orzach
Moving Hadoop to the Cloud
Bill Havanki
Microsoft Windows Networking Essentials
Darril Gibson
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Metasploit for Beginners
Sagar Rahalkar
MCSA Windows Server® 2012 R2
William Panek
Mastering System Center 2012 R2 Configuration Manager
Santos Martinez & Peter Daalmans & Brett Bennett