Svelte 3 Up and Running
Alessandro Segala
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Radar Systems and Radio Aids to Navigation
A.K. Sen & A.B. Bhattacharya
Angular: Up and Running
Shyam Seshadri
Deep Learning for Computer Vision
Rajalingappa Shanmugamani
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Red Team Tactics
How to be a graphic designer, without losing your soul
Adrian Shaughnessy
The Linux Command Line: A Complete Introduction
William Shotts
Head First Java
Kathy Sierra & Bert Bates
head first (3)
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Git Pocket Guide
Richard E. Silverman
You Don’t Know JS Yet: Scope & Closures
Kyle Simpson
You Don’t Know JS Yet (2)
You Don’t Know JS Yet: Get Started
You Don’t Know JS Yet (1)
Ionic Cookbook
Indermohan Singh
C# in Depth, Fourth Edition
Jon Skeet
Genetics 101
Beth Skwarecki
The Car Hacker’s Handbook
Craig Smith
Maven: The Definitive Guide
Sonatype Company
Compassionate Cuisine
Linda Soper-Kolton & Sara Boan
Management 101
Stephen Soundering
Think Like a Programmer
V. Anton Spraul
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Introducing Erlang
Simon St.Laurent
Introducing Elixir
Simon St.Laurent & J. David Eisenberg
On Vision and Colors by Arthur Schopenhauer and Color Sphere ...
Georg Stahl
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Designing Event-Driven Systems
Ben Stopford
Regular Expression Pocket Reference
Tony Stubblebine
Learning Scala
Jason Swartz
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Beyond the Basic Stuff with Python
Cracking Codes with Python
Invent Your Own Computer Games with Python
Tensor Analysis for Engineers: Transformations-M[..]
Mehrzad Tabatabaian
Practical Mobile Forensics - Third Edition
Rohit Tamma
Build a Binary Clock with Elixir and Nerves
Bruce A. Tate & Frank Hunleth
Programming PHP
Kevin Tatroe & Peter MacIntyre
Wicked Cool Shell Scripts
Dave Taylor & Brandon Perry
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Mastering Linux Security and Hardening
Donald A. Tevault
iOS Application Security
David Thiel
Programming Elixir ≥ 1.6
Dave Thomas
Programming Ruby 3.3
Dave Thomas & Noel Rappin
Never Use Futura
Douglas Thomas
The Threatened Net: How the Web Became a Perilous Place
Craig Timberg
Think! Eat! Act!
Raffaella Tolicetti
3D Printing
Stephanie Torta & Jonathan Torta
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Mastering Go
Mihalis Tsoukalos
RxJava for Android Developers
Timo Tuominen
Building Table Views with Phoenix LiveView
Peter Ullrich
DevOps for Networking
Steven Armstrong
Advanced Deep Learning with Keras
Rowel Atienza
Deep Reinforcement Learning Hands-On
Maxim Lapan
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Flow Architectures
James Urquhart