I Can Lick 30 Tigers Today! and Other Stories
Dr. Seuss
Mariposa
Greg Bear
Quantum Logic (2)
Are You There God? It's Me, Margaret
Judy Blume
Adventure Time - 57
Unknown
Adventure Time (1)
Threat Hunting with Elastic Stack
Andrew Pease
Automating Security Detection Engineering
Dennis Chow
Incident Response with Threat Intelligence
Roberto Martínez
The Vulnerability Researcher’s Handbook
Benjamin Strout
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Industrial Cybersecurity
Pascal Ackerman
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Machine Learning Security Principles
John Paul Mueller
C# Data Structures and Algorithms
Marcin Jamro
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
High-Performance Programming in C# and .NET
Jason Alls
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
C# Interview Guide
Konstantin Semenenko
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
Refactoring with C#
Matt Eland