Technology Strategy Patterns
Eben Hewitt
The Car Hacker’s Handbook
Craig Smith
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Learn Computer Forensics
William Oettinger
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Dive into Algorithms
Bradford Tuckfield
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Mastering Python for Networking and Security
José Manuel Ortega
Ghidra Software Reverse Engineering for Beginners
A. P. David
AWS Penetration Testing
Jonathan Helmus
Flow Architectures
James Urquhart
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Practical Hardware Pentesting
Jean-Georges Valle
Practical Process Automation
Bernd Ruecker
Deep Learning
Andrew Glassner
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Threat Hunting with Elastic Stack
Andrew Pease
Industrial Cybersecurity
Pascal Ackerman
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Building Micro-Frontends
Luca Mezzalira
Introduction to Computer Organization
Robert G. Plantz
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Incident Response with Threat Intelligence
Roberto Martínez
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Software Architecture Patterns
Mark Richards
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Jeremy Kubica
The Book of I2C
Randall Hyde
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
Digital Forensics and Incident Response
Gerard Johansen
The Vulnerability Researcher’s Handbook
Benjamin Strout
Dive Into Data Science
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Machine Learning Security Principles
John Paul Mueller
Communication Patterns
Jacqui Read
Serverless Development on AWS
Sheen Brisals and Luke Hedger
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Building Multi-Tenant SaaS Architectures
Tod Golding
Automating Security Detection Engineering
Dennis Chow
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi