Python 3 for Machine Learning
Oswald Campesato
Python for TensorFlow Pocket Primer
Bash Command Line and Shell Scripts
Securing Office 365
Matthew Katzer
Professional Red Teaming
Jacob G. Oakley
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Firewalls Don't Stop Dragons
Carey Parker
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Rust Programming Language
Steve Klabnik & Carol Nichols
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Hadoop: The Definitive Guide
Tom White
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
JavaScript: The Definitive Guide
David Flanagan
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
Java Performance: The Definitive Guide
Scott Oaks
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
Maven: The Definitive Guide
Sonatype Company
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Civil War Stories: A 150th Anniversary Collection
The Washington Post
Brain Hacking
Amy Ellis Nutt
The Cost of Clemency: The lives of 46 former prisoners whose ...
Holiday Cookies: 45 of Our Best Recipes
Ferguson: Three Minutes that Changed America
Generation Z: What It's Like to Grow up in the Age of Likes, ...
The Hunt for Bin Laden
Justice in Indian Country
Sari Horwitz
Justice For None: How the Drug War Broke the Legal System
The Kennedy Baby: The Loss That Transformed JFK
Steven Levingston
Lethal Force: The True Toll of Police Shootings in America
Ansible for Kubernetes
Jeff Geerling
Looking for America: A journey into the country's dividied heart
David Maraniss & Robert Samuels
Ansible for DevOps
NSA Secrets: Government Spying in the Internet Age
Obama's Legacy
Runaway Planet: How Global Warming is Already Changing the Earth
State Of Terror: The War Against ISIS
The Original Watergate Stories
The Permanent War: Rise of the Drones
The Resistance: Digital Dissent in the Age of Machines
Joel Achenbach
The Threatened Net: How the Web Became a Perilous Place
Craig Timberg
Zero Day: The Threat in Cyberspace
Robert O'Harrow Jr.
A Marine on Trial
John Woodrow Cox