Wireless Security Architecture: Designing and Maintaining Secure ...
Jennifer (JJ) Minella
Starsight
Brandon Sanderson
Skyward (2)
Prior Bad Acts
D.P. Lyle
A Cain/Harper Thriller (2)
The Unofficial Disney Parks Restaurants Cookbook: From Cafe ...
Ashley Craft
Head First HTML and CSS
AUTHOR NAMES HERE
Practices of the Python Pro
Dane Hillard
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
Software Transparency: Supply Chain Security in an Era of a ...
Chris Hughes & Tony Turner
If It’s Smart, It’s Vulnerable
Mikko Hypponen
Hacking APIs
Corey J. Ball
C# Data Structures and Algorithms
Marcin Jamro
Alice and Bob Learn Application Security
Tanya Janca
The C# Workshop
Jason Hales, Almantas Karpavicius & Mateus Viegas
Head First PMP
Jennifer Greene, Andrew Stellman
.NET MAUI for C# Developers
Jesse Liberty, Rodrigo Juarez
Street Coder
Sedat Kapanoglu
Head First Java
Kathy Sierra, Bert Bates & Trisha Gee
Designing Secure Software
Loren Kohnfelder
Kawaii Café Bubble Tea
Stacey Kwong & Beyah del Mundo
Learning Tensorflow.js
Gant Laborde
Unofficial Star Wars–Inspired Book of Cocktails
Rhiannon Lee
Software Mistakes and Tradeoffs
Tomasz Lelek & Jon Skeet
Learn AI-Assisted Python Programming with GitHub Copilot and ...
Leo Porter, Daniel Zingaro
Bug Bounty Bootcamp
Vickie Li
Good Code, Bad Code
Tom Long
Head First Swift
Paris Buttfield-Addison and Jonathon Manning
Official CompTIA CASP+ Student Guide
Gareth Marchant
Incident Response with Threat Intelligence
Roberto Martínez
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Eat Like a Gilmore
Kristi Carlson; Bonnie Matthews
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
9781491969557 converted
Jay McGavren
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver
Rust in Action
Tim McNamara
Regular Expression Puzzles and AI Coding Assistants
David Q. Mertz
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
AI and Machine Learning for Coders
Laurence Moroney
Machine Learning Security Principles
John Paul Mueller
The Unofficial Tiktok Cookbook: 75 Internet-Breaking Recipes ...
Valentina Mussi
The Nightmare Before Dinner
Zach Neil
Essential Math for AI
Hala Nelson
The MVVM Pattern in .NET MAUI
Pieter Nijs
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
The Unofficial Sims Cookbook: From Baked Alaska to Silly Gummy ...
Taylor O'Halloran
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
Threat Hunting with Elastic Stack
Andrew Pease
Threat Hunting in the Cloud: Defending AWS®, Azure® and Other ...
Chris Peiris & Binil Pillai & Abbas Kudrati
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Howard E. Poston III
Blockchain Security from the Bottom Up: Securing and Preventing ...
Hands-On Object-Oriented Programming with C#
Raihan Taher
Not with a Bug, But with a Sticker: Attacks on Machine Learning ...
Ram Shankar Siva Kumar & Hyrum Anderson
The Unofficial Simpsons Cookbook: From Krusty Burgers to Marge's ...
Laurel Randolph
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
The Unofficial Princess Bride Cookbook
Cassandra Reeder
The Video Game Chef
Advanced Algorithms and Data Structures
Marcello La Rocca
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Code Like a Pro in C#
Jort Rodenburg
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Quick Start Guide
John Schember