Freethinkers: A History of American Secularism
Susan Jacoby
The Art of SQL
Stephane Faroult & Peter Robson
Learn Windows PowerShell in a Month of Lunches
Don Jones & Jeffery Hicks & Jeffrey T. Hicks
Docker Containers: From Start to Enterprise
Christopher Negus
Ipv6 Essentials
Silvia Hagen
IPv6 Deployment and Management
Michael Dooley & Timothy Rooney
Introduction to 64 Bit Intel Assembly Language Programming for ...
Ray Seyfarth
Introducing Maven
Balaji Varanasi & Sudha Belida
Intellectual Property and Open Source
van Lindberg
The Intel Microprocessors (8th Edition)
Barry B. Brey
Implementing Samba 4
Marcelo Leal
Implementing Cloud Design Patterns for AWS
Marcus Young
The Illustrated Network: How TCP/IP Works in a Modern Network
Walter Goralski
HTML5 Pocket Reference
Jennifer Niederst Robbins
How Linux Works: What Every Superuser Should Know
Brian Ward
High Performance Python: Practical Performant Programming for ...
Micha Gorelick & Andy R. Terrel & Ian Ozsvald
High Performance Browser Networking: What Every Web Developer ...
Ilya Grigorik
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Hadoop Cluster Deployment
Danil Zburivsky
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
A Guide to Convolutional Neural Networks for Computer Vision
Salman Khan & Hossein Rahmani & Syed Afaq Ali Shah & Mohammed Bennamoun
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
Google Cloud Platform in Action
John J. Geewax & John Geewax
The GNU Make Book
John Graham-Cumming
GNS3 Network Simulation Guide
Rednectar Chris Welsh
Gitolite Essentials
Sitaram Chamarty
Git Pocket Guide
Richard E. Silverman
Getting Started With oVirt 3.3
Alexey Lesovsky
Genetic Programming: On the Programming of Computers by Means ...
John R. Koza
Expert C Programming: Deep C Secrets
Peter van Der Linden
Ethical Hacking and Countermeasures: Web Applications and Data ...
Ec-Council
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Elasticsearch Essentials
Bharvi Dixit
Effective Perl Programming: Ways to Write Better, More Idiomatic ...
Joseph N. Hall & Joshua A. McAdams & Brian D Foy
Joseph N. Hall & Joshua McAdams & Brian D. Foy
Docker: Up & Running
Karl Matthias & Sean P. Kane
Docker Cookbook
Sébastien Goasguen
The Docker Book: Containerization Is the New Virtualization
James Turnbull
Docker and Kubernetes for Java Developers
Jaroslaw Krochmalski
Developing RESTful Web Services With Jersey 2. 0
Sunil Gulabani
Designing Distributed Systems: Patterns and Paradigms for Scalable, ...
Brendan Burns
The Design and Implementation of the FreeBSD Operating System
Marshall Kirk McKusick & George V. Neville-Neil & Robert N. M. Watson
Deploying Rails With Docker, Kubernetes and ECS
Pablo Acuña
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Database System Concepts 6th Edition
Abraham Silberschatz & Henry Korth & S. Sudarshan
Database System Concepts 7th Edition
Henry F. Korth & S. Sudarshan & Abraham Silberschatz, Professor
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Cryptography in C and C++
Michael Welschenbach
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
CoreOS Essentials
Rimantas Mocevicius
Continuous Delivery: Reliable Software Releases Through Build, ...
Jez Humble & David Farley
Continuous Delivery With Docker and Jenkins
Rafal Leszko
Computer Organization and Architecture: Designing for Performance
Computer Networks
Andrew S. Tanenbaum & David Wetherall
Computer Graphics, C Version
Donald Hearn & M. Pauline Baker
Computational Number Theory and Modern Cryptography
Song Y. Yan
Cloud Native Infrastructure: How to Build and Manage Modern ...
Justin Garrison & Kris Nova