Death of a Salesman: Certain Private Conversations in Two Acts ...
Arthur Miller
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver
The Lay of Aotrou and Itroun
J.R.R. Tolkien
Effective Software Testing
Maurício Aniche
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Automating Security Detection Engineering
Dennis Chow
C# Data Structures and Algorithms
Marcin Jamro
C# Interview Guide
Konstantin Semenenko
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
High-Performance Programming in C# and .NET
Jason Alls
Incident Response with Threat Intelligence
Roberto Martínez
Industrial Cybersecurity
Pascal Ackerman
Machine Learning Security Principles
John Paul Mueller
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
Refactoring with C#
Matt Eland
Threat Hunting with Elastic Stack
Andrew Pease
The Vulnerability Researcher’s Handbook
Benjamin Strout