Raspberry Pi® User Guide
Eben Upton & Gareth Halfacree
Electronics For Dummies
Cathleen Shamieh
Learning Python® with Raspberry Pi®
Alex Bradbury & Ben Everard
Arduino™ Sketches
James A. Langbridge
Raspberry Pi® Projects
Dr. Andrew Robinson
Exploring BeagleBone
Derek Molloy
Complete Electronics Self-Teaching Guide with Projects
Earl Boysen & Harry Kybett
Adventures in Raspberry Pi®
Carrie Anne Philbin
Arduino For Dummies
John Nussey
BeagleBone For Dummies®
Rui Santos & Luís Perestrelo
Raspberry Pi® For Dummies®
Sean McManus & Mike Cook
Raspberry Pi® Projects For Dummies®
Mike Cook
Do-It-Yourself Circuitbuilding For Dummies
H. Ward Silver
Pro Spring 5: An In-Depth Guide to the Spring Framework and ...
Iuliana Cosmina & Rob Harrop & Chris Schaefer & Clarence Ho
Pro Spring Boot 2: An Authoritative Guide, 2nd edition
Felipe Gutierrez
Secrets & Lies: Digital Security in a Networked World
Bruce Schneier
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Threat Modeling
Adam Shostack
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
We Have Root
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Security Engineering
Ross J. Anderson
Applied Cryptography
Tribe of Hackers: Red Team
Reversing: Secrets of Reverse Engineering
Eldad Eilam
Investigating Cryptocurrencies
Nick Furneaux
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Ida Pro Book
Chris Eagle
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
C# 8.0 and .NET Core 3.0 – Modern Cross-Platform Development
Mark J. Price
C# in Depth, Fourth Edition
Jon Skeet
Ansible for DevOps
Jeff Geerling
Ansible for Kubernetes
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Maven: The Definitive Guide
Sonatype Company
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Java Performance: The Definitive Guide
Scott Oaks
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
JavaScript: The Definitive Guide
David Flanagan
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Hadoop: The Definitive Guide
Tom White
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
The Rust Programming Language
Steve Klabnik & Carol Nichols
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman