One Man's Meat
E.B. White
The Portable Arthur Miller
Arthur Miller
Practical Social Engineering
Joe Gray
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Parallel Programming and Concurrency with C# 10 and .NET 6
Alvin Ashcraft
100 Go Mistakes and How to Avoid Them
Teiva Harsanyi
If It’s Smart, It’s Vulnerable
Mikko Hypponen
High-Performance Programming in C# and .NET
Jason Alls
Data-Oriented Programming
Yehonathan Sharvit
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
Charles J. Brooks & Philip A. Craig Jr.
The Unofficial Disney Parks EPCOT Cookbook: From School Bread ...
Ashley Craft
Oishisou!! The Ultimate Anime Dessert Cookbook
Hadley Sui
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Hacking APIs
Corey J. Ball
Skills of a Successful Software Engineer
Fernando Doglio
Incident Response with Threat Intelligence
Roberto Martínez
Head First Java
Kathy Sierra, Bert Bates & Trisha Gee
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Unofficial Star Wars–Inspired Book of Cocktails
Rhiannon Lee
The Unofficial Princess Bride Cookbook
Cassandra Reeder
The Unofficial Big Lebowski Cocktail Book
André Darlington
The Anime Chef Cookbook
Nadine Estero
Wireless Security Architecture: Designing and Maintaining Secure ...
Jennifer (JJ) Minella
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Software Mistakes and Tradeoffs
Tomasz Lelek & Jon Skeet
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Howard E. Poston III
Effective Software Testing
Maurício Aniche
The Security Culture Playbook
Perry Carpenter & Kai Roer
The Art of Mac Malware
Patrick Wardle
The Art of Cyberwarfare
Jon DiMaggio
Python Concurrency with asyncio
Matthew Fowler
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Street Coder
Sedat Kapanoglu
Trust in Computer Systems and the Cloud
Mike Bursell
The Unofficial Bridgerton Cookbook: From The Viscount's Mushroom ...
Lex Taylor
Practical Doomsday
A User's Guide to the End of the World
Five Lines of Code
Christian Clausen
The Unofficial Disney Parks Drink Recipe Book: From LeFou's ...
The Hardware Hacking Handbook: Breaking Embedded Security with ...
Jasper van Woudenberg & Colin O’Flynn
Threat Hunting in the Cloud: Defending AWS®, Azure® and Other ...
Chris Peiris & Binil Pillai & Abbas Kudrati
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Designing Secure Software
Loren Kohnfelder
The Unofficial Hocus Pocus Cookbook: 50 Bewitchingly Delicious ...
Bridget Thoreson
Industrial Cybersecurity
Pascal Ackerman
Bug Bounty Bootcamp
Vickie Li
The Unofficial Simpsons Cookbook: From Krusty Burgers to Marge's ...
Laurel Randolph
Practical Machine Learning for Computer Vision
Valliappa Lakshmanan, Martin Görner, Ryan Gillard
Good Code, Bad Code
Tom Long
Threat Hunting with Elastic Stack
Andrew Pease
Full Stack Python Security
Dennis Byrne
Rust in Action
Tim McNamara
Head First Swift
Paris Buttfield-Addison and Jonathon Manning
Code Like a Pro in C#
Jort Rodenburg
The Unofficial Tiktok Cookbook: 75 Internet-Breaking Recipes ...
Valentina Mussi
Advanced Algorithms and Data Structures
Marcello La Rocca
Learning Tensorflow.js
Gant Laborde
Head First Git
Raju Gandhi
Black Hat Python
Justin Seitz & Tim Arnold
Head First Design Patterns
Eric Freeman & Elisabeth Robson
The Unofficial Disney Parks Cookbook: From Delicious Dole Whip ...
Alice and Bob Learn Application Security
Tanya Janca