Virtual Routing With Cisco Cloud Services Router (CSR 1000V)
Arvind Durai & Stephen Lynn & Amit Srivastava
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Apache Solr Beginner's Guide
Alredo Serafini
Learning VMware vCloud Air
Yohan Rohinton Wadia
RHCSA RAPID TRACK
2014
Red Hat System Administration (4)
Deploying Rails With Docker, Kubernetes and ECS
Pablo Acuña
An Introduction to Linear Algebra
Ravi P. Agarwal & Elena Cristina Flaut
A Textbook on Ordinary Differential Equations (UNITEXT / La ...
Shair Ahmad
Practical Linux Infrastructure
Syed Ali
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Systems Programming: Designing and Developing Distributed Applications
Richard Anthony
Optimization: Algorithms and Applications
Rajesh Kumar Arora
Puppet 3. 0 Beginner's Guide
John Arundel
Windows Group Policy Troubleshooting: A Best Practice Guide ...
Kapil Arya
When Google Met WikiLeaks
Julian Assange
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Software Defined Networking With OpenFlow
Siamak Azodolmolky
Getting Started With Kubernetes - Second Edition: Orchestrate ...
Jonathan Baier
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
Puppet Best Practices
Chris Barbour
AWS Certified Solutions Architect Official Study Guide: Associate ...
Joe Baron & Hisham Baz & Tim Bixler & Biff Gaut & Kevin E. Kelly & Sean Senior & John Stamper
Getting Started With MariaDB - Second Edition
Daniel Bartholomew
Learning Probabilistic Graphical Models in R
David Bellot
Mathematical Logic for Computer Science
Mordechai Ben-Ari
Swift for Absolute Beginners
Gary Bennett & Brad Lees
Jenkins Continuous Integration Cookbook
Alan Berg
Mastering Linux Kernel Development: A Kernel Developer's Reference ...
Raghu Bharadwaj
Comfortably Numb: The Inside Story of Pink Floyd
Mark Blake
Linux Command Line and Shell Scripting Bible
Richard Blum & Christine Bresnahan
Advanced Network Programming
Bogdan Ciubotaru , Gabriel-Miro Muntean
Modern Operating Systems (4th Edition)
Herbert Bos
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
The Intel Microprocessors (8th Edition)
Barry B. Brey
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Business Case Analysis With R: Simulation Tutorials to Support ...
Robert D. Brown Iii
Seven Concurrency Models in Seven Weeks: When Threads Unravel
Paul Butcher
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Architecting and Operating OpenShift Clusters: OpenShift for ...
William Caban
DevEx as a Service
Matthew Casperson
Windows Internals: User Mode
Brian Catlin & Jamie Hanrahan & Mark E. Russinovich & David A. Solomon & Alex Ionescu
X86 Assembly Language and C Fundamentals
Joseph Cavanagh
Gitolite Essentials
Sitaram Chamarty
Mastering Parallel Programming With R
Simon R. Chapple & Eilidh Troup & Thorsten Forster & Terence Sloan
Proxmox High Availability
Simon M. C. Cheng
An Introduction to Optimization
Edwin K. P. Chong & Stanislaw H. Zak
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Java EE 7 Development With WildFly
Michal Cmil & Michal Matloka & Francesco Marchioni
Network Security Through Data Analysis: Building Situational ...
Michael Collins
Logic and Discrete Mathematics: A Concise Introduction
Willem Conradie & Valentin Goranko
Learning R
Richard Cotton
Learning Perforce SCM
Robert Cowham & Neal Ralph Firth
Effective DevOps: Building a Culture of Collaboration, Affinity, ...
Jennifer Davis & Katherine Daniels
Mi novia se cayó en un pozo ciego
Diego Delfino
The Privacy Engineer’s Manifesto: Getting From Policy to Code ...
Michelle Finneran Dennedy & Jonathan Fox & Thomas Finneran
Learning OpenStack Networking
James Denton
Building a PCI DSS Information Security Program (PCI Resources ...
Yves B. Desharnais & Francois Desharnais
Elasticsearch Essentials
Bharvi Dixit
IPv6 Deployment and Management
Michael Dooley & Timothy Rooney
Think Bayes
Allen B. Downey
MySQL Cookbook: Solutions for Database Developers and Administrators
Paul Dubois
Secure Your Node.js Web Application: Keep Attackers Out and ...
Karl Duuna