Madeline in America and Other Holiday Tales
Ludwig Bemelmans
Madeline (7)
The Wind from a Burning Woman
Greg Bear
Eater
Gregory Benford
Threats: What Every Engineer Should Learn from Star Wars
Adam Shostack
.NET MAUI Cross-Platform Application Development
Roger Ye
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Practical Doomsday
A User's Guide to the End of the World
grokking continuous delivery
Christie Wilson
Microservices Design Patterns in .NET
Trevoir Williams
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Deep Learning from Scratch
Seth Weidman
The Art of Mac Malware
Patrick Wardle
TinyML
Pete Warden & Daniel Situnayake
The Hardware Hacking Handbook: Breaking Embedded Security with ...
Jasper van Woudenberg & Colin O’Flynn
Practical Machine Learning for Computer Vision
Valliappa Lakshmanan, Martin Görner, Ryan Gillard
The Official CompTIA SecurityX Student Guide (Exam CAS-005)
Unknown
Head First Learn to Code
The Active Defender: Immersion in the Offensive Security Mindset
Dr. Catherine J. Ullman
The I Love Trader Joe's Party Cookbook
Twohy, Cherie
Pragmatic Test-Driven Development in C# and .NET
Adam Tibi
The Unofficial Hocus Pocus Cookbook: 50 Bewitchingly Delicious ...
Bridget Thoreson
The Minecrafter’s Cookbook
Tara Theoharis
The Unofficial Bridgerton Cookbook: From The Viscount's Mushroom ...
Lex Taylor
The Unofficial Home Alone Cookbook: From a "Lovely" Cheese Pizza ...
Bryton Taylor
Oishisou!! The Ultimate Anime Dessert Cookbook
Hadley Sui
The Vulnerability Researcher’s Handbook
Benjamin Strout
Low-Code AI
Gwendolyn Stripling & Michael Abel
Net Zeros and Ones: How Data Erasure Promotes Sustainability, ...
Richard Stiennon & Russ B. Ernst & Fredrik Forslund
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
Data-Oriented Programming
Yehonathan Sharvit
C# Interview Guide
Konstantin Semenenko
Black Hat Python
Justin Seitz & Tim Arnold
Quick Start Guide
John Schember
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Code Like a Pro in C#
Jort Rodenburg
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Advanced Algorithms and Data Structures
Marcello La Rocca
The Video Game Chef
Cassandra Reeder
The Unofficial Princess Bride Cookbook
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
The Unofficial Simpsons Cookbook: From Krusty Burgers to Marge's ...
Laurel Randolph
Not with a Bug, But with a Sticker: Attacks on Machine Learning ...
Ram Shankar Siva Kumar & Hyrum Anderson
Hands-On Object-Oriented Programming with C#
Raihan Taher
Blockchain Security from the Bottom Up: Securing and Preventing ...
Howard E. Poston III
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Threat Hunting in the Cloud: Defending AWS®, Azure® and Other ...
Chris Peiris & Binil Pillai & Abbas Kudrati
Threat Hunting with Elastic Stack
Andrew Pease
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
The Unofficial Sims Cookbook: From Baked Alaska to Silly Gummy ...
Taylor O'Halloran
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
The MVVM Pattern in .NET MAUI
Pieter Nijs
Essential Math for AI
Hala Nelson
The Nightmare Before Dinner
Zach Neil
The Unofficial Tiktok Cookbook: 75 Internet-Breaking Recipes ...
Valentina Mussi
Machine Learning Security Principles
John Paul Mueller
AI and Machine Learning for Coders
Laurence Moroney
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Regular Expression Puzzles and AI Coding Assistants
David Q. Mertz
Rust in Action
Tim McNamara
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver