Cloud Computing Basics
T.B. Rehman
Computer Concepts and Management Information Systems
C. P. Gupta & K.K. Goyal
Programming Fundamentals Using MATLAB
Michael C. Weeks
Network Security and Cryptography
Sarhan M. Musa
Data Structures and Program Design Using C++
Dheeraj Malhotra & Neha Malhotra
TensorFlow 2.0 Pocket Primer
Oswald Campesato
Flowchart and Algorithm Basics: The Art of Programming
A. B. Chaudhuri
Microsoft Excel 2019 Programming
Julitta Korol
AUTOCAD® 2021 Beginning and Intermediate
Munir M. Hamad
Data Visualization for Business Decisions
Andres Fortino
Data Science Tools: R, Excel, KNIME, & OpenOffice
Christopher Greco
Python Basics
H. Bhasin
Data Structures and Program Design Using JAVA
Layla S. Mayboudi
Angular and Machine Learning
Pocket Primer
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Basic Electronics: Theory and Practice; Third Edition
Jean Riescher Westcott & Sean Westcott
Python 3 for Machine Learning
Python for TensorFlow Pocket Primer
Bash Command Line and Shell Scripts
Securing Office 365
Matthew Katzer
Professional Red Teaming
Jacob G. Oakley
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Firewalls Don't Stop Dragons
Carey Parker
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Rust Programming Language
Steve Klabnik & Carol Nichols
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Hadoop: The Definitive Guide
Tom White
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
JavaScript: The Definitive Guide
David Flanagan
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
Java Performance: The Definitive Guide
Scott Oaks
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
Maven: The Definitive Guide
Sonatype Company
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Ansible for Kubernetes
Jeff Geerling
Ansible for DevOps
C# in Depth, Fourth Edition
Jon Skeet
C# 8.0 and .NET Core 3.0 – Modern Cross-Platform Development
Mark J. Price
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
The Ida Pro Book
Chris Eagle
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard