George's Marvelous Medicine
Roald Dahl
Fallout
David Michaels
Tom Clancy's Splinter Cell (4)
Starsight
Brandon Sanderson
Skyward (2)
Mrs Frisby and the Rats of NIMH
Robert C. O'Brien
Rats of NIMH (1)
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
The Vulnerability Researcher’s Handbook
Benjamin Strout
C# Interview Guide
Konstantin Semenenko
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Threat Hunting with Elastic Stack
Andrew Pease
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Machine Learning Security Principles
John Paul Mueller
Incident Response with Threat Intelligence
Roberto Martínez
C# Data Structures and Algorithms
Marcin Jamro
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
Refactoring with C#
Matt Eland
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Automating Security Detection Engineering
Dennis Chow
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
High-Performance Programming in C# and .NET
Jason Alls
Industrial Cybersecurity
Pascal Ackerman