Over to You: Ten Stories of Flyers and Flying
Roald Dahl
The Tombs of Atuan
Ursula K. Le Guin
Earthsea Cycle (2)
Running Blind
Gwen Hernandez
Men of Steele (4)
Implementing Event-Driven Microservices Architecture in .NET ...
Joshua Garverick , Omar Dean McIver
The Vulnerability Researcher’s Handbook
Benjamin Strout
Threat Hunting with Elastic Stack
Andrew Pease
Refactoring with C#
Matt Eland
Real-World Implementation of C# Design Patterns
Bruce M. Van Horn II
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Microservices Communication in .NET Using gRPC
Fiodar Sazanavets
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Machine Learning Security Principles
John Paul Mueller
Industrial Cybersecurity
Pascal Ackerman
Incident Response with Threat Intelligence
Roberto Martínez
High-Performance Programming in C# and .NET
Jason Alls
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
C# Interview Guide
Konstantin Semenenko
C# Data Structures and Algorithms
Marcin Jamro
Automating Security Detection Engineering
Dennis Chow
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair