Effective C
Robert C. Seacord
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Software Architecture Patterns
Mark Richards
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
Automating Security Detection Engineering
Dennis Chow
Building Multi-Tenant SaaS Architectures
Tod Golding
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Serverless Development on AWS
Sheen Brisals and Luke Hedger
Communication Patterns
Jacqui Read
Machine Learning Security Principles
John Paul Mueller
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Dive Into Data Science
Bradford Tuckfield
The Vulnerability Researcher’s Handbook
Benjamin Strout
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Digital Forensics and Incident Response
Gerard Johansen
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
The Book of I2C
Randall Hyde
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Jeremy Kubica
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
Incident Response with Threat Intelligence
Roberto Martínez
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Introduction to Computer Organization
Robert G. Plantz
Building Micro-Frontends
Luca Mezzalira
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Industrial Cybersecurity
Pascal Ackerman
Threat Hunting with Elastic Stack
Andrew Pease
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Deep Learning
Andrew Glassner
Practical Process Automation
Bernd Ruecker
Practical Hardware Pentesting
Jean-Georges Valle
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Flow Architectures
James Urquhart
AWS Penetration Testing
Jonathan Helmus
Ghidra Software Reverse Engineering for Beginners
A. P. David
Mastering Python for Networking and Security
José Manuel Ortega
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Dive into Algorithms
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Learn Computer Forensics
William Oettinger
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
The Software Architect Elevator
Gregor Hohpe
Building Event-Driven Microservices
Adam Bellemare
Cyber Minds
Shira Rubinoff
Learn Kali Linux 2019
Glen D. Singh
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock