Foundations of Information Security: A Straightforward Introduction
Jason Andress
Computer Architecture
Charles Fox
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Computer Networking
James F. Kurose & Keith W. Ross
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
Natural Language Processing for Social Media, Third Edition
Anna Atefeh Farzindar and Diana Inkpen
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
Graph Representation Learning
William L. Hamilton
Deep Learning Systems: Algorithms, Compilers, and Processors ...
Andres Rodriguez
Federated Learning
Qiang Yang & Yang Liu & Yong Cheng & Yan Kang & Tianjian Chen and Han Yu
Creating Autonomous Vehicle Systems, Second Edition
Shaoshan Liu & Liyun Li & Jie Tang & Shuang Wu and Jean-Luc Gaudiot
Deep Learning Approaches to Text Production
Shashi Narayan and Claire Gardent
Introduction to Graph Neural Networks
Zhiyuan Liu and Jie Zhou
Efficient Processing of Deep Neural Networks
Vivienne Sze & Yu-Hsin Chen & and Tien-Ju Yang with Joel S. Emer
The Vulnerability Researcher’s Handbook
Benjamin Strout
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Machine Learning Security Principles
John Paul Mueller
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Automating Security Detection Engineering
Dennis Chow
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Threat Hunting with Elastic Stack
Andrew Pease
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Industrial Cybersecurity
Pascal Ackerman
Incident Response with Threat Intelligence
Roberto Martínez
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Math for Deep Learning: What You Need to Know to Understand ...
Ronald T. Kneusel
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan
Practical Deep Learning: A Python-Based Introduction
Algorithmic Thinking, 2nd Edition
Daniel Zingaro
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Dive into Algorithms
Bradford Tuckfield
Dive Into Data Science
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
The Book of R
Tilman M. Davies
Practical Julia: A Hands-On Introduction for Scientific Minds
Lee Phillips
Deep Learning
Andrew Glassner
The Art of Randomness: Randomized Algorithms in the Real World
The Software Architect Elevator
Gregor Hohpe
Practical Process Automation
Bernd Ruecker
Serverless Development on AWS
Sheen Brisals and Luke Hedger
Building Multi-Tenant SaaS Architectures
Tod Golding
Communication Patterns
Jacqui Read
Flow Architectures
James Urquhart
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
Building Micro-Frontends
Luca Mezzalira
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Building Event-Driven Microservices
Adam Bellemare
Technology Strategy Patterns
Eben Hewitt
Software Architecture Patterns
Mark Richards
Learn Kali Linux 2019
Glen D. Singh
Digital Forensics and Incident Response
Gerard Johansen
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes