[ { THE PEOPLES OF MIDDLE-EARTH (HISTORY OF MIDDLE-EARTH (HARDCOVER) ...
J.R.R. Tolkien
The History of Middle-Earth (12)
Great Day for Up
Dr. Seuss
Adventure Time - 17
Unknown
Adventure Time (1)
Tree and Leaf : Including 'Mythopoeia
High-Performance Programming in C# and .NET
Jason Alls
How I Rob Banks: (and other such places)
FC A.K.A. Freakyclown
How to Hack Like a Legend
Sparc Flow
The I Love Trader Joe's Party Cookbook
Twohy, Cherie
If It’s Smart, It’s Vulnerable
Mikko Hypponen
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver
Incident Response with Threat Intelligence
Roberto Martínez
Industrial Cybersecurity
Pascal Ackerman
Kawaii Café Bubble Tea
Stacey Kwong & Beyah del Mundo
Learn AI-Assisted Python Programming with GitHub Copilot and ...
Leo Porter, Daniel Zingaro
Learning Tensorflow.js
Gant Laborde
The LEGO Story
Jens Andersen
Low-Code AI
Gwendolyn Stripling & Michael Abel
Machine Learning Security Principles
John Paul Mueller
Machine Learning with Python Cookbook
Kyle Gallatin & Chris Albon
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Microservices Design Patterns in .NET
Trevoir Williams
The Minecrafter’s Cookbook
Tara Theoharis
The MVVM Pattern in .NET MAUI
Pieter Nijs
Naruto: The Unofficial Cookbook
Tom Grimm
Net Zeros and Ones: How Data Erasure Promotes Sustainability, ...
Richard Stiennon & Russ B. Ernst & Fredrik Forslund
The Nightmare Before Dinner
Zach Neil
Not with a Bug, But with a Sticker: Attacks on Machine Learning ...
Ram Shankar Siva Kumar & Hyrum Anderson
Official CompTIA CASP+ Student Guide
Gareth Marchant
The Official CompTIA SecurityX Student Guide (Exam CAS-005)
Oishisou!! The Ultimate Anime Dessert Cookbook
Hadley Sui
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Parallel Programming and Concurrency with C# 10 and .NET 6
Alvin Ashcraft
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Practical Doomsday
A User's Guide to the End of the World
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
Charles J. Brooks & Philip A. Craig Jr.
Practical Machine Learning for Computer Vision
Valliappa Lakshmanan, Martin Görner, Ryan Gillard
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
Practical Social Engineering
Joe Gray
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Practices of the Python Pro
Dane Hillard
Pragmatic Test-Driven Development in C# and .NET
Adam Tibi
Python Concurrency with asyncio
Matthew Fowler
Python How-To
Yong Cui
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Howard E. Poston III
Quick Start Guide
John Schember
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
Refactoring with C#
Matt Eland
Regular Expression Puzzles and AI Coding Assistants
David Q. Mertz
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Rust in Action
Tim McNamara
Rust Servers, Services, and Apps
Prabhu Eshwarla
The Security Culture Playbook
Perry Carpenter & Kai Roer
Serious Cryptography
Jean-Philippe Aumasson
Skills of a Successful Software Engineer
Fernando Doglio
Software Mistakes and Tradeoffs
Tomasz Lelek & Jon Skeet
Software Transparency: Supply Chain Security in an Era of a ...
Chris Hughes & Tony Turner
Street Coder
Sedat Kapanoglu
Studio Ghibli Cookbook: Unofficial Recipes Inspired by Spirited ...
Insight Editions
TensorFlow for Deep Learning
Bharath Ramsundar, Reza Bosagh Zadeh
Threat Hunting in the Cloud: Defending AWS®, Azure® and Other ...
Chris Peiris & Binil Pillai & Abbas Kudrati
Threat Hunting with Elastic Stack
Andrew Pease