The Hunt for Bin Laden
The Washington Post
Generation Z: What It's Like to Grow up in the Age of Likes, ...
Ferguson: Three Minutes that Changed America
Holiday Cookies: 45 of Our Best Recipes
The Cost of Clemency: The lives of 46 former prisoners whose ...
Brain Hacking
Amy Ellis Nutt
Civil War Stories: A 150th Anniversary Collection
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Maven: The Definitive Guide
Sonatype Company
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Java Performance: The Definitive Guide
Scott Oaks
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
JavaScript: The Definitive Guide
David Flanagan
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Hadoop: The Definitive Guide
Tom White
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
The Rust Programming Language
Steve Klabnik & Carol Nichols
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Firewalls Don't Stop Dragons
Carey Parker
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Advanced API Security
Prabath Siriwardena
Professional Red Teaming
Securing Office 365
Matthew Katzer
Bash Command Line and Shell Scripts
Oswald Campesato
Python for TensorFlow Pocket Primer
Python 3 for Machine Learning
Basic Electronics: Theory and Practice; Third Edition
Jean Riescher Westcott & Sean Westcott
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Angular and Machine Learning
Pocket Primer
Data Structures and Program Design Using JAVA
Layla S. Mayboudi
Python Basics
H. Bhasin
Data Science Tools: R, Excel, KNIME, & OpenOffice
Christopher Greco
Data Visualization for Business Decisions
Andres Fortino
AUTOCAD® 2021 Beginning and Intermediate
Munir M. Hamad
Microsoft Excel 2019 Programming
Julitta Korol
Flowchart and Algorithm Basics: The Art of Programming
A. B. Chaudhuri
TensorFlow 2.0 Pocket Primer
Data Structures and Program Design Using C++
Dheeraj Malhotra & Neha Malhotra
Network Security and Cryptography
Sarhan M. Musa
Programming Fundamentals Using MATLAB
Michael C. Weeks
Computer Concepts and Management Information Systems
C. P. Gupta & K.K. Goyal
Cloud Computing Basics
T.B. Rehman
Artificial Intelligence Machine Learning and Deep Learning