Write Great Code, Volume 1: Understanding the Machine, 2nd Edition
Randall Hyde
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Building Micro-Frontends
Luca Mezzalira
Ghidra Software Reverse Engineering for Beginners
A. P. David
Building Event-Driven Microservices
Adam Bellemare
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
Flow Architectures
James Urquhart
Communication Patterns
Jacqui Read
Building Multi-Tenant SaaS Architectures
Tod Golding
Serverless Development on AWS
Sheen Brisals and Luke Hedger
Practical Process Automation
Bernd Ruecker
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
The Software Architect Elevator
Gregor Hohpe
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
The Art of Randomness: Randomized Algorithms in the Real World
Ronald T. Kneusel
Deep Learning
Andrew Glassner
Practical Julia: A Hands-On Introduction for Scientific Minds
Lee Phillips
The Book of R
Tilman M. Davies
Dive Into Data Science
Bradford Tuckfield
Dive into Algorithms
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Algorithmic Thinking, 2nd Edition
Daniel Zingaro
Practical Deep Learning: A Python-Based Introduction
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan
Math for Deep Learning: What You Need to Know to Understand ...
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Incident Response with Threat Intelligence
Roberto Martínez
Industrial Cybersecurity
Pascal Ackerman
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Threat Hunting with Elastic Stack
Andrew Pease
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Automating Security Detection Engineering
Dennis Chow
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Machine Learning Security Principles
John Paul Mueller
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
The Vulnerability Researcher’s Handbook
Benjamin Strout
Efficient Processing of Deep Neural Networks
Vivienne Sze & Yu-Hsin Chen & and Tien-Ju Yang with Joel S. Emer
Introduction to Graph Neural Networks
Zhiyuan Liu and Jie Zhou
Deep Learning Approaches to Text Production
Shashi Narayan and Claire Gardent
Creating Autonomous Vehicle Systems, Second Edition
Shaoshan Liu & Liyun Li & Jie Tang & Shuang Wu and Jean-Luc Gaudiot
Federated Learning
Qiang Yang & Yang Liu & Yong Cheng & Yan Kang & Tianjian Chen and Han Yu
Deep Learning Systems: Algorithms, Compilers, and Processors ...
Andres Rodriguez
Graph Representation Learning
William L. Hamilton
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
Natural Language Processing for Social Media, Third Edition
Anna Atefeh Farzindar and Diana Inkpen
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau
Computer Networking
James F. Kurose & Keith W. Ross