Practical SQL: A Beginner’s Guide to Storytelling with Data
Anthony DeBarros
Perl One-Liners
Peteris Krumins
Land of Lisp
Conrad Barski M.D.
Learn You a Haskell for Great Good!
Miran Lipovaca
Learn Java the Easy Way
Bryson Payne
If Hemingway Wrote Javascript
Angus Croll
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan
The Art of Assembly Language
Randall Hyde
Clojure for the Brave and True
Daniel Higginbotham
The Book of R
Tilman M. Davies
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Artificial Intelligence Machine Learning and Deep Learning
Oswald Campesato
Cloud Computing Basics
T.B. Rehman
Computer Concepts and Management Information Systems
C. P. Gupta & K.K. Goyal
Programming Fundamentals Using MATLAB
Michael C. Weeks
Network Security and Cryptography
Sarhan M. Musa
Data Structures and Program Design Using C++
Dheeraj Malhotra & Neha Malhotra
TensorFlow 2.0 Pocket Primer
Flowchart and Algorithm Basics: The Art of Programming
A. B. Chaudhuri
Microsoft Excel 2019 Programming
Julitta Korol
AUTOCAD® 2021 Beginning and Intermediate
Munir M. Hamad
Data Visualization for Business Decisions
Andres Fortino
Data Science Tools: R, Excel, KNIME, & OpenOffice
Christopher Greco
Python Basics
H. Bhasin
Data Structures and Program Design Using JAVA
Layla S. Mayboudi
Angular and Machine Learning
Pocket Primer
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Basic Electronics: Theory and Practice; Third Edition
Jean Riescher Westcott & Sean Westcott
Python 3 for Machine Learning
Python for TensorFlow Pocket Primer
Bash Command Line and Shell Scripts
Securing Office 365
Matthew Katzer
Professional Red Teaming
Jacob G. Oakley
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Firewalls Don't Stop Dragons
Carey Parker
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Rust Programming Language
Steve Klabnik & Carol Nichols
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Hadoop: The Definitive Guide
Tom White
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
JavaScript: The Definitive Guide
David Flanagan
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
Java Performance: The Definitive Guide
Scott Oaks
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw