Head First Android Development
Dawn Griffiths & David Griffiths
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
For Your Eyes Only
Ian Fleming
James Bond - Extended Series (8)
Adventure Time - 35
Unknown
Adventure Time (1)
Automating Security Detection Engineering
Dennis Chow
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
C# Interview Guide
Konstantin Semenenko
C# Data Structures and Algorithms
Marcin Jamro
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Refactoring with C#
Matt Eland
Machine Learning Security Principles
John Paul Mueller
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
The Vulnerability Researcher’s Handbook
Benjamin Strout
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
High-Performance Programming in C# and .NET
Jason Alls
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Incident Response with Threat Intelligence
Roberto Martínez
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Industrial Cybersecurity
Pascal Ackerman
Threat Hunting with Elastic Stack
Andrew Pease