Securing Office 365
Matthew Katzer
Professional Red Teaming
Jacob G. Oakley
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Firewalls Don't Stop Dragons
Carey Parker
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Rust Programming Language
Steve Klabnik & Carol Nichols
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Hadoop: The Definitive Guide
Tom White
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
JavaScript: The Definitive Guide
David Flanagan
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
Java Performance: The Definitive Guide
Scott Oaks
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
Maven: The Definitive Guide
Sonatype Company
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Ansible for Kubernetes
Jeff Geerling
Ansible for DevOps
C# in Depth, Fourth Edition
Jon Skeet
C# 8.0 and .NET Core 3.0 – Modern Cross-Platform Development
Mark J. Price
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
The Ida Pro Book
Chris Eagle
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Investigating Cryptocurrencies
Nick Furneaux
Reversing: Secrets of Reverse Engineering
Eldad Eilam
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Applied Cryptography
Bruce Schneier
Security Engineering
Ross J. Anderson
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Tribe of Hackers
We Have Root
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Threat Modeling
Adam Shostack
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Secrets & Lies: Digital Security in a Networked World
Pro Spring Boot 2: An Authoritative Guide, 2nd edition
Felipe Gutierrez
Pro Spring 5: An In-Depth Guide to the Spring Framework and ...
Iuliana Cosmina & Rob Harrop & Chris Schaefer & Clarence Ho