Introduction to Graph Neural Networks
Zhiyuan Liu and Jie Zhou
AWS Penetration Testing
Jonathan Helmus
The Book of I2C
Randall Hyde
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Algorithmic Thinking, 2nd Edition
Daniel Zingaro
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
The Art of Randomness: Randomized Algorithms in the Real World
Ronald T. Kneusel
Attacking Network Protocols
James Forshaw
Automating Security Detection Engineering
Dennis Chow
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
The Book of R
Tilman M. Davies
Building Event-Driven Microservices
Adam Bellemare
Building Micro-Frontends
Luca Mezzalira
Building Multi-Tenant SaaS Architectures
Tod Golding
The Car Hacker’s Handbook
Craig Smith
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
Code Craft
Pete Goodliffe
Communication Patterns
Jacqui Read
The Complete Developer
Martin Krause
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Computer Architecture
Charles Fox
Computer Graphics from Scratch: A Programmer’s Introduction ...
Gabriel Gambetta
Computer Networking
James F. Kurose & Keith W. Ross
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
Creating Autonomous Vehicle Systems, Second Edition
Shaoshan Liu & Liyun Li & Jie Tang & Shuang Wu and Jean-Luc Gaudiot
Cyber Minds
Shira Rubinoff
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Jeremy Kubica
Deep Learning
Andrew Glassner
Deep Learning Approaches to Text Production
Shashi Narayan and Claire Gardent
Deep Learning Systems: Algorithms, Compilers, and Processors ...
Andres Rodriguez
Digital Forensics and Incident Response
Gerard Johansen
Dive into Algorithms
Bradford Tuckfield
Dive Into Data Science
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
Effective C
Robert C. Seacord
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Efficient Processing of Deep Neural Networks
Vivienne Sze & Yu-Hsin Chen & and Tien-Ju Yang with Joel S. Emer
Federated Learning
Qiang Yang & Yang Liu & Yong Cheng & Yan Kang & Tianjian Chen and Han Yu
Flow Architectures
James Urquhart
Foundations of Information Security: A Straightforward Introduction
Jason Andress
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Ghidra Software Reverse Engineering for Beginners
A. P. David
Graph Algorithms the Fun Way
Graph Representation Learning
William L. Hamilton
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
The Hardware Hacker
Andrew “bunnie” Huang
How Computers Really Work: A Hands-On Guide to the Inner Workings ...
Matthew Justice
How Software Works
V. Anton Spraul
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan
Incident Response with Threat Intelligence
Roberto Martínez
Industrial Cybersecurity
Pascal Ackerman
Inside the Machine
Jon Stokes
Introduction to Computer Organization
Robert G. Plantz
Learn Computer Forensics
William Oettinger