Introducing .NET 6: Getting Started with Blazor, MAUI, Windows ...
Nico Vermeir
Mastering Kali Linux for Advanced Penetration Testing, Second ...
Vijay Kumar Velu
Python Playground: Geeky Projects for the Curious Programmer
Manesh Vekitachalam
Practical LPIC-3 300
Antonio Vazquez
Real-World Python: A Hacker’s Guide to Solving Problems with ...
Lee Vaughan
Impractical Python Projects: Playful Programming Activities ...
Natural Language Processing with Python and Spacy: A Practical ...
Yuli Vasiliev
Python Deep Learning
Ivan Vasilev
Hazardous Waste Management
Cliff VanGuilder
Effective TypeScript
Dan Vanderkam
Clojure Cookbook
Luke VanderHart & Ryan Neufeld
Flow Architectures
James Urquhart
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Raspberry Pi® User Guide
Eben Upton & Gareth Halfacree
The New Oxford American Dictionary
Unknown
Oxford Dictionary of English
Better PHP Development
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
Deep Reinforcement Learning Hands-On
Maxim Lapan
Advanced Deep Learning with Keras
Rowel Atienza
DevOps for Networking
Steven Armstrong
Building Table Views with Phoenix LiveView
Peter Ullrich
PHP Advanced and Object-Oriented Programming
Larry Ullman
PHP for the Web
Personal Finance in Your 20s & 30s For Dummies
Eric Tyson
TypeScript Handbook
TypeScript Team
RxJava for Android Developers
Timo Tuominen
Mastering Go
Mihalis Tsoukalos
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Efficient Algorithms for Sorting and Synchronization (rsync)
Andrew Tridgell
3D Printing
Stephanie Torta & Jonathan Torta
Think! Eat! Act!
Raffaella Tolicetti
Playing Smart: On Games, Intelligence, and Artificial Intelligence
Julian Togelius
The Threatened Net: How the Web Became a Perilous Place
Craig Timberg
Cybersecurity Incident Response
Eric C. Thompson
Never Use Futura
Douglas Thomas
Programming Ruby 3.3
Dave Thomas & Noel Rappin
Programming Elixir ≥ 1.6
Dave Thomas
iOS Application Security
David Thiel
Mastering Linux Security and Hardening
Donald A. Tevault
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Wicked Cool Shell Scripts
Dave Taylor & Brandon Perry
Programming PHP
Kevin Tatroe & Peter MacIntyre
Build a Binary Clock with Elixir and Nerves
Bruce A. Tate & Frank Hunleth
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Computer Networks (5th edition)
Andrew S. Tanenbaum & David J. Wetherall
Distributed Systems Principles and Paradigms
Andrew S. Tanenbaum & Maarten van Steen
Practical Mobile Forensics - Third Edition
Rohit Tamma
Tensor Analysis for Engineers: Transformations-M[..]
Mehrzad Tabatabaian
Learn C Programming
Jeff Szuhay
Invent Your Own Computer Games with Python
Al Sweigart
Cracking Codes with Python
Beyond the Basic Stuff with Python
Automate the Boring Stuff with Python: Practical Programming ...
Learning Scala
Jason Swartz
Official Google Cloud Certified Associate Cloud Engineer Study ...
Dan Sullivan
Official Google Cloud Certified Professional Data Engineer: ...
Learning DevSecOps
Steve Suehring
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Regular Expression Pocket Reference
Tony Stubblebine