The Book of Lost Tales, Part 1
J. R. R. Tolkien
The Book of Lost Tales (1)
Build Your Own Paas With Docker
Oskar Hane
C Programming: A Modern Approach
Kim N. King
El cuento de la criada
Margaret Atwood & Elsa Mateo
Free Money for All: A Basic Income Guarantee Solution for the ...
Walker
Brave New World
Aldous Huxley
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Learn Windows PowerShell in a Month of Lunches
Don Jones & Jeffery Hicks & Jeffrey T. Hicks
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Practical Hive: A Guide to Hadoop's Data Warehouse System
Scott Shaw & Cindy Gross & Ankur Gupta
Groovy in Action: Covers Groovy 2.4
Erik Pragt
Orchestrating Docker
Shrikrishna Holla
Network Security Assessment: Know Your Network
Chris McNab
Migrating Large-Scale Services to the Cloud
Eric Passmore
Nginx: From Beginner to Pro
Rahul Soni
Learning Probabilistic Graphical Models in R
David Bellot
Windows Group Policy Troubleshooting: A Best Practice Guide ...
Kapil Arya
Building Embedded Systems: Programmable Hardware
Changyi Gu
Accelerated Linux Core Dump Analysis: Training Course Transcript ...
Dmitry Vostokov & Software Diagnostics Services
Learning Vmware Nsx
Ranjit Singh Thakurratan
Learning Proxmox VE
Rik Goldman
Moving to Office 365: Planning and Migration Guide
Matthew Katzer
Amazon Web Services in Action
Andreas Wittig & Michael Wittig
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Site Reliability Engineering: How Google Runs Production Systems
Niall Richard Murphy & Chris Jones & Jennifer Petoff & Betsy Beyer
Punk Rock: So What?: The Cultural Legacy of Punk
Roger Sabin
Secure Your Node.js Web Application: Keep Attackers Out and ...
Karl Duuna
Applied Chemistry: A Textbook for Engineers and Technologists
Oleg Roussak & H. D. Gesser
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
LTE, WiMAX and WLAN Network Design, Optimization and Performance ...
Leonhard Korowajczuk
Using Docker: Developing and Deploying Software With Containers
Adrian Mouat
Systems Programming: Designing and Developing Distributed Applications
Richard Anthony
Building Applications on Mesos
David Greenberg
Software Networks
Guy Pujolle
Enterprise IPv6 for Enterprise Networks
Ghazi Mokammel Hossain
IPv6 Essentials
Silvia Hagen
Docker Cookbook
Sébastien Goasguen
LTE - the UMTS Long Term Evolution: From Theory to Practice
Stefania Sesia & Issam Toufik & Matthew Baker
Mastering Machine Learning With R
Cory Lesmeister
Learning Bayesian Models With R
Dr. Hari M. Koduvely
Building a PCI DSS Information Security Program (PCI Resources ...
Yves B. Desharnais & Francois Desharnais
RT Essentials
Richard Foley
WildFly Configuration, Deployment, and Administration - Second ...
Christopher Ritchie
Red Hat Enterprise Linux 7 RH134 Red Hat System Administration ...
Red Hat Training
Red Hat System Administration (2)
Learning AWS
Aurobindo Sarkar & Amit Shah
Jenkins Essentials
Mitesh Soni
Mastering Apache Spark
Mike Frampton
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
The GNU Make Book
John Graham-Cumming
VMware Virtual SAN Cookbook
Jeffrey Taylor
WildFly Cookbook
Luigi Fugaro
Learning Docker
Pethuru Raj & Jeeva S. Chelladhurai & Vinod Singh
Effective DevOps: Building a Culture of Collaboration, Affinity, ...
Jennifer Davis & Katherine Daniels
CoreOS Essentials
Rimantas Mocevicius
Puppet Best Practices
Chris Barbour
Mastering OpenStack
Omar Khedher
Mastering Chef
Mayank Joshi
Learning VMware vCloud Air
Yohan Rohinton Wadia
Learning Puppet 4
Jo Rhett
Implementing Cloud Design Patterns for AWS
Marcus Young
Getting Started With MariaDB - Second Edition
Daniel Bartholomew