Cyber Security on Azure
Marshall Copeland
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Firewalls Don't Stop Dragons
Carey Parker
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Jacob G. Oakley
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Rust Programming Language
Steve Klabnik & Carol Nichols
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Hadoop: The Definitive Guide
Tom White
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
JavaScript: The Definitive Guide
David Flanagan
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
Java Performance: The Definitive Guide
Scott Oaks
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
Maven: The Definitive Guide
Sonatype Company
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Civil War Stories: A 150th Anniversary Collection
The Washington Post
Brain Hacking
Amy Ellis Nutt
The Cost of Clemency: The lives of 46 former prisoners whose ...
Holiday Cookies: 45 of Our Best Recipes
Ferguson: Three Minutes that Changed America
Generation Z: What It's Like to Grow up in the Age of Likes, ...
The Hunt for Bin Laden
Justice in Indian Country
Sari Horwitz
Justice For None: How the Drug War Broke the Legal System
The Kennedy Baby: The Loss That Transformed JFK
Steven Levingston
Lethal Force: The True Toll of Police Shootings in America
Ansible for Kubernetes
Jeff Geerling
Looking for America: A journey into the country's dividied heart
David Maraniss & Robert Samuels
Ansible for DevOps
NSA Secrets: Government Spying in the Internet Age
Obama's Legacy
Runaway Planet: How Global Warming is Already Changing the Earth
State Of Terror: The War Against ISIS
The Original Watergate Stories
The Permanent War: Rise of the Drones
The Resistance: Digital Dissent in the Age of Machines
Joel Achenbach
The Threatened Net: How the Web Became a Perilous Place
Craig Timberg
Zero Day: The Threat in Cyberspace
Robert O'Harrow Jr.
A Marine on Trial
John Woodrow Cox
C# in Depth, Fourth Edition
Jon Skeet
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
The Ida Pro Book
Chris Eagle
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Investigating Cryptocurrencies
Nick Furneaux
Reversing: Secrets of Reverse Engineering
Eldad Eilam