Adventure Time - 54
Unknown
Adventure Time (1)
Adventure Time - 59
Bridge of Clay
Markus Zusak
Spotty Powder and other Splendiferous Secrets
Roald Dahl
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
The Security Culture Playbook
Perry Carpenter & Kai Roer
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
The Unofficial Harry Potter Cookbook
Dinah Bucholz
Practical Social Engineering
Joe Gray
Good Code, Bad Code
Tom Long
How I Rob Banks: (and other such places)
FC A.K.A. Freakyclown
Practical Machine Learning for Computer Vision
Valliappa Lakshmanan, Martin Görner, Ryan Gillard
C# Interview Guide
Konstantin Semenenko
Pragmatic Test-Driven Development in C# and .NET
Adam Tibi
Microservices Design Patterns in .NET
Trevoir Williams
Silence on the Wire
Michal Zalewski
Practical Doomsday
A User's Guide to the End of the World
Software Architecture with C# 10 and .NET 6
Gabriel Baptista, Francesco Abbruzzese
Python How-To
Yong Cui
The Unofficial Sims Cookbook: From Baked Alaska to Silly Gummy ...
Taylor O'Halloran
Naruto: The Unofficial Cookbook
Tom Grimm
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Learn AI-Assisted Python Programming with GitHub Copilot and ...
Leo Porter, Daniel Zingaro
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Building Machine Learning Pipelines
Hannes Hapke, Catherine Nelson
The Art of Mac Malware
Patrick Wardle
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Howard E. Poston III
Hacking APIs
Corey J. Ball
Blockchain Security from the Bottom Up: Securing and Preventing ...
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver
Software Transparency: Supply Chain Security in an Era of a ...
Chris Hughes & Tony Turner
The Unofficial Witcher Cookbook: Daringly Delicious Recipes ...
Trey Guillory
Deep Learning for Coders with fastai and PyTorch
Sylvain Gugger & Jeremy Howard
The Nightmare Before Dinner
Zach Neil
Wireless Security Architecture: Designing and Maintaining Secure ...
Jennifer (JJ) Minella
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
Charles J. Brooks & Philip A. Craig Jr.
If It’s Smart, It’s Vulnerable
Mikko Hypponen
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
High-Performance Programming in C# and .NET
Jason Alls
Clean Code with C#
Unofficial Star Wars–Inspired Book of Cocktails
Rhiannon Lee
Code Like a Pro in C#
Jort Rodenburg
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
The Anime Chef Cookbook
Nadine Estero
C# Data Structures and Algorithms
Marcin Jamro
Unofficial Cookbook for Fans of Willy Wonka
Dahlia Clearwater
Full Stack Python Security
Dennis Byrne
TinyML
Pete Warden & Daniel Situnayake
The Minecrafter’s Cookbook
Tara Theoharis
Low-Code AI
Gwendolyn Stripling & Michael Abel
Python Concurrency with asyncio
Matthew Fowler
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
The Video Game Chef
Cassandra Reeder
.NET MAUI for C# Developers
Jesse Liberty, Rodrigo Juarez
Eat Like a Gilmore: Daily Cravings
Kristi Carlson
Eat Like a Gilmore
Kristi Carlson; Bonnie Matthews
Rust Servers, Services, and Apps
Prabhu Eshwarla
Deep Learning from Scratch
Seth Weidman
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals, ...
Mark J. Price
C# 10 and .NET 6 – Modern Cross-Platform Development
Machine Learning with Python Cookbook
Kyle Gallatin & Chris Albon
TensorFlow for Deep Learning
Bharath Ramsundar, Reza Bosagh Zadeh
The Battle for Your Computer: Israel and the Growth of the Global ...
Alon Arvatz