Love of the Last Tycoon: The Authorized Text
F. Scott Fitzgerald
Adventure Time - 47
Unknown
Adventure Time (1)
Darwin's Children
Greg Bear
Darwin's Radio (2)
Adventure Time - 30
Industrial Cybersecurity
Pascal Ackerman
High-Performance Programming in C# and .NET
Jason Alls
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Automating Security Detection Engineering
Dennis Chow
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Refactoring with C#
Matt Eland
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
C# Data Structures and Algorithms
Marcin Jamro
Incident Response with Threat Intelligence
Roberto Martínez
Machine Learning Security Principles
John Paul Mueller
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Threat Hunting with Elastic Stack
Andrew Pease
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
C# Interview Guide
Konstantin Semenenko
The Vulnerability Researcher’s Handbook
Benjamin Strout
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner