Pro Linux High Availability Clustering
Sander van Vugt
Working With Coders: A Guide to Software Development for the ...
Patrick Gleeson
Kubernetes Cookbook: Building Cloud Native Applications
Sébastien Goasguen & Michael Hausenblas
El cuento de la criada
Margaret Atwood & Elsa Mateo
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
Mastering Apache Spark
Mike Frampton
Jenkins Essentials
Mitesh Soni
Learning AWS
Aurobindo Sarkar & Amit Shah
Red Hat Enterprise Linux 7 RH134 Red Hat System Administration ...
Red Hat Training
Red Hat System Administration (2)
WildFly Configuration, Deployment, and Administration - Second ...
Christopher Ritchie
RT Essentials
Richard Foley
Building a PCI DSS Information Security Program (PCI Resources ...
Yves B. Desharnais & Francois Desharnais
Learning Bayesian Models With R
Dr. Hari M. Koduvely
Mastering Machine Learning With R
Cory Lesmeister
LTE - the UMTS Long Term Evolution: From Theory to Practice
Stefania Sesia & Issam Toufik & Matthew Baker
Docker Cookbook
Sébastien Goasguen
IPv6 Essentials
Silvia Hagen
Enterprise IPv6 for Enterprise Networks
Ghazi Mokammel Hossain
Software Networks
Guy Pujolle
Building Applications on Mesos
David Greenberg
Systems Programming: Designing and Developing Distributed Applications
Richard Anthony
Using Docker: Developing and Deploying Software With Containers
Adrian Mouat
LTE, WiMAX and WLAN Network Design, Optimization and Performance ...
Leonhard Korowajczuk
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
Applied Chemistry: A Textbook for Engineers and Technologists
Oleg Roussak & H. D. Gesser
Secure Your Node.js Web Application: Keep Attackers Out and ...
Karl Duuna
Punk Rock: So What?: The Cultural Legacy of Punk
Roger Sabin
Site Reliability Engineering: How Google Runs Production Systems
Niall Richard Murphy & Chris Jones & Jennifer Petoff & Betsy Beyer
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Amazon Web Services in Action
Andreas Wittig & Michael Wittig
Moving to Office 365: Planning and Migration Guide
Matthew Katzer
Learning Proxmox VE
Rik Goldman
Learning Vmware Nsx
Ranjit Singh Thakurratan
Accelerated Linux Core Dump Analysis: Training Course Transcript ...
Dmitry Vostokov & Software Diagnostics Services
Building Embedded Systems: Programmable Hardware
Changyi Gu
Windows Group Policy Troubleshooting: A Best Practice Guide ...
Kapil Arya
Learning Probabilistic Graphical Models in R
David Bellot
Nginx: From Beginner to Pro
Rahul Soni
Migrating Large-Scale Services to the Cloud
Eric Passmore
Network Security Assessment: Know Your Network
Chris McNab
Orchestrating Docker
Shrikrishna Holla
Groovy in Action: Covers Groovy 2.4
Erik Pragt
Practical Hive: A Guide to Hadoop's Data Warehouse System
Scott Shaw & Cindy Gross & Ankur Gupta
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon
Learn Windows PowerShell in a Month of Lunches
Don Jones & Jeffery Hicks & Jeffrey T. Hicks
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Brave New World
Aldous Huxley
Free Money for All: A Basic Income Guarantee Solution for the ...
Walker
R in 24 Hours, Sams Teach Yourself
Andy Nicholls & Richard Pugh & Aimee Gott
The Complete Works of Leo Tolstoy (34 Complete Works of Leo ...
Leo Tolstoy
AWS Certified Solutions Architect Official Study Guide: Associate ...
Joe Baron & Hisham Baz & Tim Bixler & Biff Gaut & Kevin E. Kelly & Sean Senior & John Stamper
Chef Cookbook - Third Edition
Matthias Marschall
PostgreSQL 9 High Availability Cookbook
Shaun M. Thomas
Implementing Cybersecurity: A Guide to the National Institute ...
Anne Kohnke & Ken Sigler & Dan Shoemaker
Statistics: Informed Decisions Using Data, Global Edition
Michael Sullivan
Java 9 Revealed: For Early Adoption and Migration
Kishori Sharan
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Mastering Parallel Programming With R
Simon R. Chapple & Eilidh Troup & Thorsten Forster & Terence Sloan
Apache Spark 2.x Cookbook
Rishi Yadav
Deep Learning: Practical Neural Networks With Java
Yusuke Sugomori & Bostjan Kaluza & Fabio M. Soares & Alan M. F. Souza