Castle in the Air
Diana Wynne Jones
Howl's Moving Castle (2)
My Brigadista Year
Katherine Paterson
Witch Week
Chrestomanci (Recommended Reading Order) (3)
The Last Straw
Jeff Kinney
Diary of a Wimpy Kid (3)
.NET MAUI Cross-Platform Application Development
Roger Ye
.NET MAUI for C# Developers
Jesse Liberty, Rodrigo Juarez
100 Go Mistakes and How to Avoid Them
Teiva Harsanyi
9781491969557 converted
Jay McGavren
The Active Defender: Immersion in the Offensive Security Mindset
Dr. Catherine J. Ullman
Advanced Algorithms and Data Structures
Marcello La Rocca
AI and Machine Learning for Coders
Laurence Moroney
Alice and Bob Learn Application Security
Tanya Janca
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
The Anime Chef Cookbook
Nadine Estero
The Art of Cyberwarfare
Jon DiMaggio
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
The Art of Mac Malware
Patrick Wardle
Automating Security Detection Engineering
Dennis Chow
The Battle for Your Computer: Israel and the Growth of the Global ...
Alon Arvatz
Black Hat GraphQL
Nick Aleks & Dolev Farhi
Black Hat Python
Justin Seitz & Tim Arnold
Blockchain Security from the Bottom Up: Securing and Preventing ...
Howard E. Poston III
Bug Bounty Bootcamp
Vickie Li
Building Machine Learning Pipelines
Hannes Hapke, Catherine Nelson
C# Data Structures and Algorithms
Marcin Jamro
C# Interview Guide
Konstantin Semenenko
The C# Workshop
Jason Hales, Almantas Karpavicius & Mateus Viegas
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Clean Code with C#
Jason Alls
Code Like a Pro in C#
Jort Rodenburg
Data-Oriented Programming
Yehonathan Sharvit
Deep Learning for Coders with fastai and PyTorch
Sylvain Gugger & Jeremy Howard
Deep Learning from Scratch
Seth Weidman
Designing Secure Software
Loren Kohnfelder
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Eat Like a Gilmore
Kristi Carlson; Bonnie Matthews
Eat Like a Gilmore: Daily Cravings
Kristi Carlson
Effective Software Testing
Maurício Aniche
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Essential Math for AI
Hala Nelson
Feast of the Dragon Cookbook: The Unofficial House of the Dragon ...
Tom Grimm
Five Lines of Code
Christian Clausen
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Full Stack Python Security
Dennis Byrne
Generative Deep Learning
David Foster
Good Code, Bad Code
Tom Long
grokking continuous delivery
Christie Wilson
Hacking APIs
Corey J. Ball
Hands-On Object-Oriented Programming with C#
Raihan Taher
The Hardware Hacking Handbook: Breaking Embedded Security with ...
Jasper van Woudenberg & Colin O’Flynn
Head First Agile
Andrew Stellman and Jennifer Greene
Head First Android Development
Dawn Griffiths & David Griffiths
Head First Design Patterns
Eric Freeman & Elisabeth Robson
Head First Git
Raju Gandhi
Head First HTML and CSS
AUTHOR NAMES HERE
Head First Java
Kathy Sierra, Bert Bates & Trisha Gee
Head First Kotlin
Dawn Griffiths and David Griffiths
Head First Learn to Code
Unknown
Head First PMP
Jennifer Greene, Andrew Stellman
Head First Python
Head First Software Architecture
Raju Gandhi & Mark Richards & and Neal Ford
Head First Swift
Paris Buttfield-Addison and Jonathon Manning