Apache Spark 2.x Cookbook
Rishi Yadav
Jenkins Continuous Integration Cookbook
Alan Berg
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
Mastering Node.js
Sandro Pasquali
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ec-Council
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Learning MySQL and MariaDB: Heading in the Right Direction With ...
Russell J. T. Dyer
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Virtual Routing With Cisco Cloud Services Router (CSR 1000V)
Arvind Durai & Stephen Lynn & Amit Srivastava
MySQL Cookbook: Solutions for Database Developers and Administrators
Paul Dubois
Think Bayes
Allen B. Downey
IPv6 Deployment and Management
Michael Dooley & Timothy Rooney
Elasticsearch Essentials
Bharvi Dixit
The Privacy Engineer’s Manifesto: Getting From Policy to Code ...
Michelle Finneran Dennedy & Jonathan Fox & Thomas Finneran
Learning R
Richard Cotton
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Proxmox High Availability
Simon M. C. Cheng
Mastering Parallel Programming With R
Simon R. Chapple & Eilidh Troup & Thorsten Forster & Terence Sloan
Gitolite Essentials
Sitaram Chamarty
X86 Assembly Language and C Fundamentals
Joseph Cavanagh
Windows Internals: User Mode
Brian Catlin & Jamie Hanrahan & Mark E. Russinovich & David A. Solomon & Alex Ionescu
Architecting and Operating OpenShift Clusters: OpenShift for ...
William Caban
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Seven Concurrency Models in Seven Weeks: When Threads Unravel
Paul Butcher
Designing Distributed Systems: Patterns and Paradigms for Scalable, ...
Brendan Burns
Business Case Analysis With R: Simulation Tutorials to Support ...
Robert D. Brown Iii
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
The Intel Microprocessors (8th Edition)
Barry B. Brey
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
PostgreSQL Replication
Zoltan Boszormenyi & Hans-Jürgen Schönig
Linux Command Line and Shell Scripting Bible
Richard Blum & Christine Bresnahan
Seeking SRE: Conversations About Running Production Systems ...
David N. Blank-Edelman
Mastering Linux Kernel Development: A Kernel Developer's Reference ...
Raghu Bharadwaj
Swift for Absolute Beginners
Gary Bennett & Brad Lees
Mathematical Logic for Computer Science
Mordechai Ben-Ari
A Practical Guide to Advanced Networking
Jeffrey S. Beasley & Piyasat Nilkaew
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
Software Defined Networking With OpenFlow
Siamak Azodolmolky
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Puppet 3. 0 Beginner's Guide
John Arundel
Optimization: Algorithms and Applications
Rajesh Kumar Arora
Mastering Bitcoin: Programming the Open Blockchain
Andreas M. Antonopoulos
Systems Programming: Designing and Developing Distributed Applications
Richard Anthony
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Deploying Rails With Docker, Kubernetes and ECS
Pablo Acuña