Waging Cyber War
Jacob G. Oakley
Visual Studio Code Distilled: Evolved Code Editing for Windows, ...
Alessandro Del Sole
Using and Administering Linux: Volume 3
David Both
Using and Administering Linux: Volume 2
Using and Administering Linux: Volume 1
Typed PHP
Christopher Pitt
Stylish F# 6: Crafting Elegant Functional Code for .NET 6
Kit Eason
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Securing Office 365
Matthew Katzer
Professional Red Teaming
Pro SQL Server on Linux
Bob Ward
Pro Spring Boot 2: An Authoritative Guide, 2nd edition
Felipe Gutierrez
Pro Spring 5: An In-Depth Guide to the Spring Framework and ...
Iuliana Cosmina & Rob Harrop & Chris Schaefer & Clarence Ho
Pro Microservices in .NET 6: With Examples Using ASP.NET Core ...
Sean Whitesell & Rob Richardson & Matthew D. Groves
Pro Linux System Administration
Dennis Matotek & James Turnbull & Peter Lieverdink
Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms ...
Marius Iulian Mihailescu & Stefania Loredana Nita
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Pro ASP.NET Core Identity: Under the Hood with Authentication ...
Adam Freeman
Pro ASP.NET Core 6: Develop Cloud-Ready Web Applications Using ...
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Practical System Programming with C
Sri Manikanta Palakollu
Practical PHP and MySQL Website Databases
Adrian W. West
Practical Paint.NET: The Powerful No-Cost Image Editor for Microsoft ...
Phillip Whitt
Practical LPIC-3 300
Antonio Vazquez
Practical Entity Framework Core 6: Database Access for Enterprise ...
Brian L. Gorman
Practical Cyber Forensics
Niranjan Reddy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
PHP Objects, Patterns, and Practice
Matt Zandstra
PHP Arrays
Steve Prettyman
Personal Cybersecurity
Marvin Waschke
PCI DSS
Jim Seaman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Monitoring Microservices and Containerized Applications
Navin Sabharwal & Piyush Pandey
ML.NET Revealed: Simple Tools for Applying Machine Learning ...
Sudipta Mukherjee
Migrating to MariaDB
William Wood
Microsoft Conversational AI Platform for Developers: End-to-End ...
Stephan Bisser
Microsoft Blazor: Building Web Applications in .NET 6 and Beyond
Peter Himschoot
Mastering Azure API Management: A Practical Approach to Designing ...
Sven Malvik
Linux Sound Programming
Jan Newmarch
The Linux Philosophy for SysAdmins
Linux Containers and Virtualization
Shashank Mohan Jain
Learn Windows Subsystem for Linux
Prateek Singh
Lean Software Systems Engineering for Developers: Managing Requirements, ...
Doug Durham & Chad Michel
Kubernetes
Philippe Martin
Introducing ZFS on Linux
Damian Wojsław
Introducing Microsoft Quantum Computing for Developers: Using ...
Johnny Hooyberghs
Introducing Distributed Application Runtime (Dapr): Simplifying ...
Radoslav Gatev
Introducing .NET for Apache Spark: Distributed Processing for ...
Ed Elliott
Introducing .NET 6: Getting Started with Blazor, MAUI, Windows ...
Nico Vermeir
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Hands-on GitHub Actions: Implement CI/CD with GitHub Action ...
Chaminda Chandrasekara & Pushpa Herath
Hands-on Booting
Yogesh Babar
GNU Octave by Example
Ashwin Pajankar & Sharvani Chandu
Foundations of Libvirt Development
W. David Ashley
Firewalls Don't Stop Dragons
Carey Parker
Essential TypeScript 4: From Beginner to Pro
Essential ASP.NET Web Forms Development: Full Stack Programming ...
Robert E. Beasley
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity for Space