Sunshine State
D.P. Lyle
Jake Longly (3)
Iliad, Books 1-12 (Oxford Classical Texts: Homeri Opera, Vol. ...
Homer
The Iliad by Homer (1)
Madeline's Christmas
Ludwig Bemelmans
Madeline (6)
Head First Agile
Andrew Stellman and Jennifer Greene
Refactoring with C#
Matt Eland
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
C# Interview Guide
Konstantin Semenenko
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
High-Performance Programming in C# and .NET
Jason Alls
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
C# Data Structures and Algorithms
Marcin Jamro
Machine Learning Security Principles
John Paul Mueller
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Industrial Cybersecurity
Pascal Ackerman
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
The Vulnerability Researcher’s Handbook
Benjamin Strout
Incident Response with Threat Intelligence
Roberto Martínez
Automating Security Detection Engineering
Dennis Chow
Threat Hunting with Elastic Stack
Andrew Pease