Threat Hunting with Elastic Stack
Andrew Pease
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Automating Security Detection Engineering
Dennis Chow
Software Architecture Patterns
Mark Richards
Writing a C Compiler
Nora Sandler
Write Great Code, Volume 1: Understanding the Machine, 2nd Edition
Randall Hyde
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
The Vulnerability Researcher’s Handbook
Benjamin Strout
Technology Strategy Patterns
Eben Hewitt
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
The Software Architect Elevator
Gregor Hohpe
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Serverless Development on AWS
Sheen Brisals and Luke Hedger
Serious Cryptography
Jean-Philippe Aumasson
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Practical Process Automation
Bernd Ruecker
Practical Packet Analysis 3rd Edition
Chris Sanders
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
Practical Julia: A Hands-On Introduction for Scientific Minds
Lee Phillips
Practical Hardware Pentesting
Jean-Georges Valle
Practical Deep Learning: A Python-Based Introduction
Ronald T. Kneusel
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau
Natural Language Processing for Social Media, Third Edition
Anna Atefeh Farzindar and Diana Inkpen
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Math for Deep Learning: What You Need to Know to Understand ...
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Mastering Python for Networking and Security
José Manuel Ortega
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Machine Learning Security Principles
John Paul Mueller
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Linux Basics for Hackers
OccupyTheWeb
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
Learn Kali Linux 2019
Glen D. Singh
Learn Computer Forensics
William Oettinger
Introduction to Graph Neural Networks
Zhiyuan Liu and Jie Zhou
Introduction to Computer Organization
Robert G. Plantz
Inside the Machine
Jon Stokes
Industrial Cybersecurity
Pascal Ackerman
Incident Response with Threat Intelligence
Roberto Martínez
Impractical Python Projects: Playful Programming Activities ...
Lee Vaughan