The Art of Computer Programming: Combinational Algorithms, Part ...
Donald E. Knuth
The Art of Computer Programming (4)
Regular Expression Pocket Reference: Regular Expressions for ...
Tony Stubblebine
Implementing Cybersecurity: A Guide to the National Institute ...
Anne Kohnke & Ken Sigler & Dan Shoemaker
The Joy of Clojure
Michael Fogus & Chris Houser
21st Century C: C Tips From the New School
Ben Klemens
4G: Deployment Strategies and Operational Implications
Trichy Venkataraman Krishnamurthy & Rajaneesh Shetty
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Michael W. Lucas
Accelerated Linux Core Dump Analysis: Training Course Transcript ...
Dmitry Vostokov & Software Diagnostics Services
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Advanced Programming in the UNIX Environment
W. Richard Stevens & Stephen A. Rago
Amazon Web Services in Action
Andreas Wittig & Michael Wittig
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Apache Maven 3 Cookbook
Srirangan
Apache Security
Ivan Ristic
Apache Solr Beginner's Guide
Alredo Serafini
Apache Solr High Performance
Surendra Mohan
Application Development With Qt Creator
Ray Rischpater
Architecting and Operating OpenShift Clusters: OpenShift for ...
William Caban
Architecting the Cloud: Design Decisions for Cloud Computing ...
Michael J. Kavis
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
The Art of Application Performance Testing: From Strategy to ...
Ian Molyneaux
The Art of Computer Programming: Fundamental Algorithms
The Art of Computer Programming (1)
The Art of Computer Programming: Seminumerical Algorithms
The Art of Computer Programming (2)
The Art of Computer Programming: Sorting and Searching
The Art of Computer Programming (3)
The Art of SQL
Stephane Faroult & Peter Robson
Artificial Intelligence: A Modern Approach
Stuart Jonathan Russell & Peter Norvig
Augmented Reality for Android Application Development
Jens Grubert & Dr. Raphael Grasset
Automation Through Chef Opscode: A Hands-On Approach to Chef
Navin Sabharwal & Manak Wadhwa
Bash Pocket Reference
Arnold Robbins
Beginning Haskell: A Project-Based Approach
Alejandro Serrano Mena
Beginning Java With WebSphere
Robert W. Janson
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
Building Applications on Mesos
David Greenberg
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
Business Case Analysis With R: Simulation Tutorials to Support ...
Robert D. Brown Iii
C Primer Plus
Stephen Prata
C Programming: A Modern Approach
Kim N. King
CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, ...
Todd Lammle
CEH Certified Ethical Hacker Study Guide
Kimberly Graves
CentOS 6 Linux Server Cookbook
Jonathan Hobson
Chef Infrastructure Automation Cookbook
Matthias Marschall
Cisco CCIE Routing and Switching V5. 0
Narbik Kocharians & Peter Paluch & Wendell Odom
Cloud Native Infrastructure: How to Build and Manage Modern ...
Justin Garrison & Kris Nova
Computational Number Theory and Modern Cryptography
Song Y. Yan
Computer Graphics, C Version
Donald Hearn & M. Pauline Baker
Computer Networks
Andrew S. Tanenbaum & David Wetherall
Computer Organization and Architecture: Designing for Performance
William Stallings
Continuous Delivery With Docker and Jenkins
Rafal Leszko
Continuous Delivery: Reliable Software Releases Through Build, ...
Jez Humble & David Farley
CoreOS Essentials
Rimantas Mocevicius
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Cryptography and Network Security: Principles and Practice (4th ...
Cryptography in C and C++
Michael Welschenbach
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Database System Concepts 7th Edition
Henry F. Korth & S. Sudarshan & Abraham Silberschatz, Professor
Database System Concepts 6th Edition
Abraham Silberschatz & Henry Korth & S. Sudarshan
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
Deploying Rails With Docker, Kubernetes and ECS
Pablo Acuña