Advanced API Security
Prabath Siriwardena
Real-World Kanban
Mattias Skarin
C# in Depth, Fourth Edition
Jon Skeet
Learning Git
Anna Skoulikari
Genetics 101
Beth Skwarecki
The Car Hacker’s Handbook
Craig Smith
Visual Studio Code Distilled: Evolved Code Editing for Windows, ...
Alessandro Del Sole
Maven: The Definitive Guide
Sonatype Company
Pitch the Perfect Investment: The Essential Guide to Winning ...
Paul D. Sonkin & Paul Johnson
Compassionate Cuisine
Linda Soper-Kolton & Sara Boan
Kotlin Design Patterns and Best Practices
Alexey Soshin
Management 101
Stephen Soundering
How to Build a Better Pie: Sweet and Savory Recipes for Flaky ...
Millicent Souris
Hot Damn and Hell Yeah
Ryan Splint
Think Like a Programmer
V. Anton Spraul
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Audio Visualization Using ThMAD
Peter Späth
Introducing Erlang
Simon St.Laurent
Introducing Elixir
Simon St.Laurent & J. David Eisenberg
On Vision and Colors by Arthur Schopenhauer and Color Sphere ...
Georg Stahl
Become a Great Engineering Leader
James Stanier
Become an Effective Software Engineering Manager
Effective Remote Work
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Hearty Vegan Meals For Monster Appetites
Celine Steen & Joni Marie Newman
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Head First C#
Andrew Stellman & Jennifer Greene
head first (4)
Don't Make Me Think, Revisited (Voices That Matter)
Krug Steve
Type Rules!
Ilene Strizver
Regular Expression Pocket Reference
Tony Stubblebine
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Learning DevSecOps
Steve Suehring
Official Google Cloud Certified Professional Data Engineer: ...
Dan Sullivan
Official Google Cloud Certified Associate Cloud Engineer Study ...
Learning Scala
Jason Swartz
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Beyond the Basic Stuff with Python
Cracking Codes with Python
Invent Your Own Computer Games with Python
Learn C Programming
Jeff Szuhay
Tensor Analysis for Engineers: Transformations-M[..]
Mehrzad Tabatabaian
Practical Mobile Forensics - Third Edition
Rohit Tamma
Build a Binary Clock with Elixir and Nerves
Bruce A. Tate & Frank Hunleth
Programming PHP
Kevin Tatroe & Peter MacIntyre
Wicked Cool Shell Scripts
Dave Taylor & Brandon Perry
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Mastering Linux Security and Hardening
Donald A. Tevault
iOS Application Security
David Thiel
Programming Elixir ≥ 1.6
Dave Thomas
Programming Ruby 3.3
Dave Thomas & Noel Rappin
Never Use Futura
Douglas Thomas
Cybersecurity Incident Response
Eric C. Thompson
The Threatened Net: How the Web Became a Perilous Place
Craig Timberg
Playing Smart: On Games, Intelligence, and Artificial Intelligence
Julian Togelius
Think! Eat! Act!
Raffaella Tolicetti
3D Printing
Stephanie Torta & Jonathan Torta
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Mastering Go
Mihalis Tsoukalos
RxJava for Android Developers
Timo Tuominen
TypeScript Handbook
TypeScript Team