PHP 7 Programming Blueprints
Jose Palala & Martin Helmich
PHP 7 Data Structures and Algorithms
Mizanur Rahman
Building a Web Application with PHP and MariaDB: A Reference ...
Sai Srinivas Sriparasa
Hands-On Red Team Tactics
Himanshu Sharma
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Mastering Linux Security and Hardening
Donald A. Tevault
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Becoming the Hacker
Adrian Pruteanu
Artificial Intelligence By Example
Denis Rothman
Deep Learning for Computer Vision
Rajalingappa Shanmugamani
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
Deep Reinforcement Learning Hands-On
Maxim Lapan
Hands-On Artificial Intelligence for IoT
Amita Kapoor
Hands-On Deep Learning for Games
Micheal Lanham
Hands-On Machine Learning for Algorithmic Trading
Stefan Jansen
Hands-On Reinforcement Learning with Python
Sudharsan Ravichandiran
Hands-On Transfer Learning with Python
Dipanjan Sarkar
Machine Learning for Mobile
Revathi Gopalakrishnan
Mastering Machine Learning Algorithms
Giuseppe Bonaccorso
Natural Language Processing with TensorFlow
Thushan Ganegedara
Python Deep Learning
Ivan Vasilev
Python Deep Learning Projects
Matthew Lamons
Python Machine Learning By Example
Yuxi (Hayden) Liu
Python Machine Learning Cookbook, Second Edition
Giuseppe Ciaburro
Unity Artificial Intelligence Programming , Fourth Edition
Davide Aversa
Advanced Deep Learning with Keras
Rowel Atienza
Hands-on Cybersecurity for Architects
Neil Rerup
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Kali Linux - An Ethical Hacker's Cookbook
Hands-On Penetration Testing on Windows
Phil Bramwell
Industrial Cybersecurity
Pascal Ackerman
Learning Malware Analysis
MONNAPPA K A
Mastering pfSense, Second Edition
David Zientara
Mastering Kali Linux for Advanced Penetration Testing, Second ...
Vijay Kumar Velu
Network Analysis Using Wireshark 2 Cookbook Second Edition
Nagendra Kumar Nainar
Metasploit for Beginners
Sagar Rahalkar
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Practical Cyber Intelligence
Wilson Bautista Jr.
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Digital Forensics and Incident Response
Gerard Johansen
Practical Mobile Forensics - Third Edition
Rohit Tamma
Cybersecurity: Attack and Defense Strategies
Yuri Diogenes
Web Penetration Testing with Kali Linux - Third Edition
Gilberto Nájera-Gutiérrez
CompTIA Security+ Certification Guide
Ian Neil
Continuous Delivery With Jenkins
Rafał Leszko
Deployment with Docker
Srdjan Grubor
DevOps for Networking
Steven Armstrong
DevOps with Kubernetes
Hideto Saito & Hui-Chuan Cloe Lee & Cheng-Yang Wu
Docker and Kubernetes for Java Developers
Jaroslaw Krochmalski
Effective DevOps with AWS
Nathaniel Felsen
Getting Started with Kubernetes, Second Edition
Jonathan Baier
Learning Continuous Integration with Jenkins
Nikhil Pathania
Mastering Ansible - Second Edition
Jesse Keating
Mastering Docker
Russ McKendrick & Scott Gallagher
Mastering Kubernetes
Gigi Sayfan
OpenStack Administration with Ansible 2 - Second Edition
Walter Bentley
Practical Network Automation
Abhishek Ratan
Puppet 5 Beginner's Guide Third Edition
John Arundel
Windows Server 2016 Automation with PowerShell Cookbook
Thomas Lee