Son
Lois Lowry
The Giver (4)
The Unofficial Sims Cookbook: From Baked Alaska to Silly Gummy ...
Taylor O'Halloran
Endgame
David Michaels
Tom Clancy's Splinter Cell (6)
The Unofficial Simpsons Cookbook: From Krusty Burgers to Marge's ...
Laurel Randolph
Regular Expression Puzzles and AI Coding Assistants
David Q. Mertz
The Vulnerability Researcher’s Handbook
Benjamin Strout
Black Hat GraphQL
Nick Aleks & Dolev Farhi
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Tress of the Emerald Sea
Brandon Sanderson
The Cosmere (28)
Essential Math for AI
Hala Nelson
Naruto: The Unofficial Cookbook
Tom Grimm
Threats: What Every Engineer Should Learn from Star Wars
Adam Shostack
Microservices Design Patterns in .NET
Trevoir Williams
Net Zeros and Ones: How Data Erasure Promotes Sustainability, ...
Richard Stiennon & Russ B. Ernst & Fredrik Forslund
The Unofficial Stranger Things Cookbook: (Pop Culture Cookbook, ...
Feast of the Dragon Cookbook: The Unofficial House of the Dragon ...
The Unofficial Lord of the Rings Cookbook: From Hobbiton to ...
The Lost Metal
The Mistborn Saga (7)
The Unofficial Witcher Cookbook: Daringly Delicious Recipes ...
Trey Guillory
The Unofficial Universal Theme Parks Cookbook: From Moose Juice ...
Ashley Craft
Studio Ghibli Cookbook: Unofficial Recipes Inspired by Spirited ...
Insight Editions
The Unofficial Hogwarts Cocktail Book: Spellbinding Spritzes, ...
Barmann
The LEGO Story
Jens Andersen
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
The C# Workshop
Jason Hales, Almantas Karpavicius & Mateus Viegas
Pragmatic Test-Driven Development in C# and .NET
Adam Tibi
Bastille vs. the Evil Librarians
Alcatraz vs. the Evil Librarians (6)
grokking continuous delivery
Christie Wilson
Blockchain Security from the Bottom Up: Securing and Preventing ...
Howard E. Poston III
How to Hack Like a Legend
Sparc Flow
Parallel Programming and Concurrency with C# 10 and .NET 6
Alvin Ashcraft
100 Go Mistakes and How to Avoid Them
Teiva Harsanyi
If It’s Smart, It’s Vulnerable
Mikko Hypponen
High-Performance Programming in C# and .NET
Jason Alls
Data-Oriented Programming
Yehonathan Sharvit
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
Charles J. Brooks & Philip A. Craig Jr.
The Unofficial Disney Parks EPCOT Cookbook: From School Bread ...
Oishisou!! The Ultimate Anime Dessert Cookbook
Hadley Sui
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Hacking APIs
Corey J. Ball
Skills of a Successful Software Engineer
Fernando Doglio
Incident Response with Threat Intelligence
Roberto Martínez
Head First Java
Kathy Sierra, Bert Bates & Trisha Gee
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Unofficial Star Wars–Inspired Book of Cocktails
Rhiannon Lee
The Unofficial Princess Bride Cookbook
Cassandra Reeder
The Unofficial Big Lebowski Cocktail Book
André Darlington
The Anime Chef Cookbook
Nadine Estero
Wireless Security Architecture: Designing and Maintaining Secure ...
Jennifer (JJ) Minella
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Software Mistakes and Tradeoffs
Tomasz Lelek & Jon Skeet
Practical Social Engineering
Joe Gray
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Effective Software Testing
Maurício Aniche
The Security Culture Playbook
Perry Carpenter & Kai Roer
The Art of Mac Malware
Patrick Wardle
Software Architecture with C# 10 and .NET 6
Gabriel Baptista, Francesco Abbruzzese
The Art of Cyberwarfare
Jon DiMaggio
Python Concurrency with asyncio
Matthew Fowler
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Street Coder
Sedat Kapanoglu