Mrs Frisby and the Rats of NIMH
Robert C. O'Brien
Rats of NIMH (1)
The One in the Middle Is the Green Kangaroo
Judy Blume
Skin Deep
Brandon Sanderson
Legion (2)
Checkmate
David Michaels
Tom Clancy's Splinter Cell (3)
Hacking APIs
Corey J. Ball
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
The Unofficial Disney Parks EPCOT Cookbook: From School Bread ...
Ashley Craft
Oishisou!! The Ultimate Anime Dessert Cookbook
Hadley Sui
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
Charles J. Brooks & Philip A. Craig Jr.
Data-Oriented Programming
Yehonathan Sharvit
High-Performance Programming in C# and .NET
Jason Alls
If It’s Smart, It’s Vulnerable
Mikko Hypponen
100 Go Mistakes and How to Avoid Them
Teiva Harsanyi
Parallel Programming and Concurrency with C# 10 and .NET 6
Alvin Ashcraft
How to Hack Like a Legend
Sparc Flow
Blockchain Security from the Bottom Up: Securing and Preventing ...
Howard E. Poston III
grokking continuous delivery
Christie Wilson
Bastille vs. the Evil Librarians
Alcatraz vs. the Evil Librarians (6)
Pragmatic Test-Driven Development in C# and .NET
Adam Tibi
The C# Workshop
Jason Hales, Almantas Karpavicius & Mateus Viegas
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
The LEGO Story
Jens Andersen
The Unofficial Sims Cookbook: From Baked Alaska to Silly Gummy ...
Taylor O'Halloran
The Unofficial Universal Theme Parks Cookbook: From Moose Juice ...
Studio Ghibli Cookbook: Unofficial Recipes Inspired by Spirited ...
Insight Editions
The Unofficial Hogwarts Cocktail Book: Spellbinding Spritzes, ...
Barmann
The Unofficial Witcher Cookbook: Daringly Delicious Recipes ...
Trey Guillory
The Unofficial Lord of the Rings Cookbook: From Hobbiton to ...
Tom Grimm
The Lost Metal
The Mistborn Saga (7)
The Unofficial Stranger Things Cookbook: (Pop Culture Cookbook, ...
Feast of the Dragon Cookbook: The Unofficial House of the Dragon ...
Net Zeros and Ones: How Data Erasure Promotes Sustainability, ...
Richard Stiennon & Russ B. Ernst & Fredrik Forslund
Microservices Design Patterns in .NET
Trevoir Williams
Threats: What Every Engineer Should Learn from Star Wars
Adam Shostack
Naruto: The Unofficial Cookbook
Essential Math for AI
Hala Nelson
Tress of the Emerald Sea
The Cosmere (28)
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Black Hat GraphQL
Nick Aleks & Dolev Farhi
The Vulnerability Researcher’s Handbook
Benjamin Strout
Regular Expression Puzzles and AI Coding Assistants
David Q. Mertz
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver
.NET MAUI for C# Developers
Jesse Liberty, Rodrigo Juarez
Head First Software Architecture
Raju Gandhi & Mark Richards & and Neal Ford
The Unofficial Dollywood Cookbook: From Frannie's Famous Fried ...
Erin Browne
The Frugal Wizard’s Handbook for Surviving Medieval England
Secret Projects (2)
The Video Game Chef
Cassandra Reeder
Kawaii Café Bubble Tea
Stacey Kwong & Beyah del Mundo
Unofficial Cookbook for Fans of Willy Wonka
Dahlia Clearwater
Generative Deep Learning
David Foster
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Not with a Bug, But with a Sticker: Attacks on Machine Learning ...
Ram Shankar Siva Kumar & Hyrum Anderson
Python How-To
Yong Cui
How I Rob Banks: (and other such places)
FC A.K.A. Freakyclown
Software Transparency: Supply Chain Security in an Era of a ...
Chris Hughes & Tony Turner
The Unofficial Super Mario Cookbook
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Yumi and the Nightmare Painter
The Cosmere (29)
Rust Servers, Services, and Apps
Prabhu Eshwarla
The Active Defender: Immersion in the Offensive Security Mindset
Dr. Catherine J. Ullman
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Machine Learning with Python Cookbook
Kyle Gallatin & Chris Albon
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner