Trickery
Roald Dahl
Tales Of (1)
Casino Royale
Ian Fleming
James Bond - Extended Series (1)
Hotel Splendide: the charming and witty memoir from 'the original ...
Ludwig Bemelmans
Burmese days
George Orwell
Automating Security Detection Engineering
Dennis Chow
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
C# Interview Guide
Konstantin Semenenko
C# Data Structures and Algorithms
Marcin Jamro
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Refactoring with C#
Matt Eland
Machine Learning Security Principles
John Paul Mueller
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
The Vulnerability Researcher’s Handbook
Benjamin Strout
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
High-Performance Programming in C# and .NET
Jason Alls
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
Incident Response with Threat Intelligence
Roberto Martínez
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Industrial Cybersecurity
Pascal Ackerman
Threat Hunting with Elastic Stack
Andrew Pease