Building Event-Driven Microservices
Adam Bellemare
Federated Learning
Qiang Yang & Yang Liu & Yong Cheng & Yan Kang & Tianjian Chen and Han Yu
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Linux Basics for Hackers
OccupyTheWeb
Learn Computer Forensics
William Oettinger
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
Mastering Python for Networking and Security
José Manuel Ortega
Threat Hunting with Elastic Stack
Andrew Pease
Practical Julia: A Hands-On Introduction for Scientific Minds
Lee Phillips
Introduction to Computer Organization
Robert G. Plantz
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
Communication Patterns
Jacqui Read
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Software Architecture Patterns
Mark Richards
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Deep Learning Systems: Algorithms, Compilers, and Processors ...
Andres Rodriguez
Cyber Minds
Shira Rubinoff
Practical Process Automation
Bernd Ruecker
Practical Packet Analysis 3rd Edition
Chris Sanders
Writing a C Compiler
Nora Sandler
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Effective C
Robert C. Seacord
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Learn Kali Linux 2019
Glen D. Singh
The Car Hacker’s Handbook
Craig Smith
How Software Works
V. Anton Spraul
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Inside the Machine
Jon Stokes
The Vulnerability Researcher’s Handbook
Benjamin Strout
Efficient Processing of Deep Neural Networks
Vivienne Sze & Yu-Hsin Chen & and Tien-Ju Yang with Joel S. Emer
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Dive Into Data Science
Bradford Tuckfield
Dive into Algorithms
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Flow Architectures
James Urquhart
Practical Hardware Pentesting
Jean-Georges Valle
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Introduction to Graph Neural Networks
Zhiyuan Liu and Jie Zhou
Algorithmic Thinking, 2nd Edition
Daniel Zingaro