Design for Hackers: Reverse-Engineering Beauty
David Kadavy
Deployment with Docker
Srdjan Grubor
Deploying to OpenShift
Graham Dumpleton
Defensive Eating with Morrissey
Automne Zingg & Joshua Ploeg
Deep Reinforcement Learning Hands-On
Maxim Lapan
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
Deep Learning from Scratch
Seth Weidman
Deep Learning for Computer Vision
Rajalingappa Shanmugamani
Debt 101
Michele Cagan
Dear Data
Giorgia Lupi & Stefanie Posavec
Dead Witch Walking
Kim Harrison
Dead Run
Adam Mansbach
Day Trading 101
David Borman
Database Systems: The Complete Book (2nd Edition)
Hector Garcia-Molina & Jeffrey D. Ullman & Jennifer Widom
Database Reliability Engineering
Laine Campbell & Charity Majors
Data Visualization with Python and JavaScript
Kyran Dale
Data Visualization for Business Decisions
Andres Fortino
Data Structures and Program Design Using Python: A Self-Teaching ...
Neha Malhotra & Dheeraj Malhotra
Data Structures and Program Design Using JAVA
Layla S. Mayboudi
Data Structures and Program Design Using C++
Dheeraj Malhotra & Neha Malhotra
Data Science Tools: R, Excel, KNIME, & OpenOffice
Christopher Greco
Data Science from Scratch
Joel Grus
Data Cleaning
Oswald Campesato
Data Analysis with Open Source Tools
Philipp K. Janert
Data Analysis for Business Decisions
The Daily Cocktail
Dalyn A. Miller & Larry Donovan
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Cybersecurity: Attack and Defense Strategies
Yuri Diogenes
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity for Space
Jacob G. Oakley
Cyber Security on Azure
Marshall Copeland
The Curse of Chalion
Lois McMaster Bujold
CSS: The Definitive Guide
Eric A. Meyer & Estelle Weyl
CSS Refactoring
Steve Lindstrom
CSS Pocket Reference
Eric A. Meyer
CSS in Depth
Keith J. Grant
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Cryptocurrency Investing For Dummies
Kiana Danial
Creative, Inc
Meg Mateo Ilasco & Joy Deangdeelert Cho
Crazy Sexy Kitchen
Kris Carr & Chef Chand Sarno
Crazy Sexy Juice: 100+ Simple Juice, Smoothie & Nut Milk Recipes ...
Kris Carr
Crazy For Kanji
Eve Kushner
Cravings Made Vegan
Bianca Haun & Sacha Naderer
Craft GraphQL APIs in Elixir with Absinthe
Ben Wilson & Bruce Williams
The Craft Cocktail Compendium
Warren Bobrow
Cracking Codes with Python
Al Sweigart
The Cost of Clemency: The lives of 46 former prisoners whose ...
The Washington Post
Continuous Delivery With Jenkins
Rafał Leszko
Continuous Delivery in Java
Abraham Marín-Pérez & Daniel Bryant
Continuous API Management
Mehdi Medjaoui & Erik Wilde & Ronnie Mitra & Mike Amundsen
Concurrent Data Processing in Elixir
Svilen Gospodinov
Concentrated Investing
Allen C. Benello & Michael Van Biema & Tobias E. Carlisle
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Computer Programming for Absolute Beginners
Joakim Wassberg
Computer Organization and Design: The Hardware/Software Interface
David A. Patterson & John L. Hennessy
Computer Networks (5th edition)
Andrew S. Tanenbaum & David J. Wetherall