CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Deep Learning
Andrew Glassner
How Software Works
V. Anton Spraul
How Computers Really Work: A Hands-On Guide to the Inner Workings ...
Matthew Justice
The Hardware Hacker
Andrew “bunnie” Huang
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Graph Representation Learning
William L. Hamilton
Graph Algorithms the Fun Way
Jeremy Kubica
Ghidra Software Reverse Engineering for Beginners
A. P. David
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Flow Architectures
James Urquhart
Federated Learning
Qiang Yang & Yang Liu & Yong Cheng & Yan Kang & Tianjian Chen and Han Yu
Efficient Processing of Deep Neural Networks
Vivienne Sze & Yu-Hsin Chen & and Tien-Ju Yang with Joel S. Emer
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Effective C
Robert C. Seacord
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
Dive Into Data Science
Bradford Tuckfield
Dive into Algorithms
Digital Forensics and Incident Response
Gerard Johansen
Deep Learning Systems: Algorithms, Compilers, and Processors ...
Andres Rodriguez
Deep Learning Approaches to Text Production
Shashi Narayan and Claire Gardent
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Cyber Minds
Shira Rubinoff
Creating Autonomous Vehicle Systems, Second Edition
Shaoshan Liu & Liyun Li & Jie Tang & Shuang Wu and Jean-Luc Gaudiot
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
Computer Networking
James F. Kurose & Keith W. Ross
Computer Graphics from Scratch: A Programmer’s Introduction ...
Gabriel Gambetta
Computer Architecture
Charles Fox
The Complete Developer
Martin Krause
Communication Patterns
Jacqui Read
Code Craft
Pete Goodliffe
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
The Car Hacker’s Handbook
Craig Smith
Building Multi-Tenant SaaS Architectures
Tod Golding
Building Micro-Frontends
Luca Mezzalira
Building Event-Driven Microservices
Adam Bellemare
The Book of R
Tilman M. Davies
The Book of I2C
Randall Hyde
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
AWS Penetration Testing
Jonathan Helmus
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Automating Security Detection Engineering
Dennis Chow
Attacking Network Protocols
James Forshaw
The Art of Randomness: Randomized Algorithms in the Real World
Ronald T. Kneusel
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Algorithmic Thinking, 2nd Edition
Daniel Zingaro