Ghidra Software Reverse Engineering for Beginners
A. P. David
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Math for Deep Learning: What You Need to Know to Understand ...
Ronald T. Kneusel
Software Architecture: The Hard Parts
Mark Richards & Neal Ford & Pramod Sadalage & and Zhamak Dehghani
Algorithmic Thinking, 2nd Edition
Daniel Zingaro
Introduction to Graph Neural Networks
Zhiyuan Liu and Jie Zhou
Federated Learning
Qiang Yang & Yang Liu & Yong Cheng & Yan Kang & Tianjian Chen and Han Yu
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan
Practical Hardware Pentesting
Jean-Georges Valle
Flow Architectures
James Urquhart
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Dive into Algorithms
Bradford Tuckfield
Dive Into Data Science
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Efficient Processing of Deep Neural Networks
Vivienne Sze & Yu-Hsin Chen & and Tien-Ju Yang with Joel S. Emer
The Vulnerability Researcher’s Handbook
Benjamin Strout
Inside the Machine
Jon Stokes
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
How Software Works
V. Anton Spraul
The Car Hacker’s Handbook
Craig Smith
Learn Kali Linux 2019
Glen D. Singh
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Effective C
Robert C. Seacord
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Writing a C Compiler
Nora Sandler
Practical Packet Analysis 3rd Edition
Chris Sanders
Practical Process Automation
Bernd Ruecker
Cyber Minds
Shira Rubinoff
Deep Learning Systems: Algorithms, Compilers, and Processors ...
Andres Rodriguez
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Software Architecture Patterns
Mark Richards
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Communication Patterns
Jacqui Read
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Introduction to Computer Organization
Robert G. Plantz
Practical Julia: A Hands-On Introduction for Scientific Minds
Lee Phillips
Threat Hunting with Elastic Stack
Andrew Pease
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Mastering Python for Networking and Security
José Manuel Ortega
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Learn Computer Forensics
William Oettinger
Linux Basics for Hackers
OccupyTheWeb
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Machine Learning Security Principles
John Paul Mueller
Building Micro-Frontends
Luca Mezzalira
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice