Programming Kubernetes: Developing Cloud-Native Applications
Michael Hausenblas & Stefan Schimanski
A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence ...
James Bamford
Chain of Command
C. G. Cooper
Corps Justice (9)
Very, Very, Very Dreadful: The Influenza Pandemic of 1918
Albert Marrin
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
TLS Mastery
Michael W. Lucas
IT Mastery (16)
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Linux Server Security: Hack and Defend
Chris Binnie
Learning Nessus for Penetration Testing
Himanshu Kumar
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Elastix Unified Communications Server Cookbook
Gerardo Barajas Puente
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Cloud Native Security
Chris Binnie & Rory McCune
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi