Securing DevOps: Safe Services in the Cloud
Julien Vehent
The Hobbit
J. R. R. Tolkien
The Lord of the Rings (1)
Tmux Taster
Mark McDonnell
Chef Cookbook - Third Edition
Matthias Marschall
Red Hat Enterprise Linux 6 Administration: Real World Skills ...
Sander van Vugt
Computational Number Theory and Modern Cryptography
Song Y. Yan
X86 Assembly Language and C Fundamentals
Joseph Cavanagh
Learn You Some Erlang for Great Good!: A Beginner's Guide
Fred Hébert
An Introduction to Optimization
Edwin K. P. Chong & Stanislaw H. Zak
Chef Infrastructure Automation Cookbook
LTE-Advanced and Next Generation Wireless Networks: Channel ...
Guillaume de La Roche & Andrés Alayón-Glazunov & Ben Allen
Learn Windows PowerShell in a Month of Lunches
Don Jones & Jeffery Hicks & Jeffrey T. Hicks
Operating System Concepts, 9th Edition
Abraham Silberschatz
Operating System Concepts (1)
Applied Chemistry: A Textbook for Engineers and Technologists
Oleg Roussak & H. D. Gesser
Linux Bible
Christopher Negus & Christine Bresnahan
Mathematical Logic for Computer Science
Mordechai Ben-Ari
Seven Databases in Seven Weeks: A Guide to Modern Databases ...
Eric Redmond & Jim R. Wilson
Programming Clojure
Stuart Halloway & Aaron Bedra
Theory of Computation
George Tourlakis
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Jenkins Continuous Integration Cookbook
Alan Berg
The Debian Administrator's Handbook: Debian Squeeze From Discovery ...
Raphaël Hertzog & Roland Mas
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Network Security Essentials: Applications and Standards
William Stallings
TCP/IP Illustrated: Volume 1 The Protocols
Kevin R. Fall & W. Richard Stevens
TCP/IP Ilustrated (1)
Statistical Pattern Recognition
Andrew R. Webb & Keith D. Copsey
Introduction to 64 Bit Intel Assembly Language Programming for ...
Ray Seyfarth
Shell Scripting
Steve Parker
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
LTE - the UMTS Long Term Evolution: From Theory to Practice
Stefania Sesia & Issam Toufik & Matthew Baker
LTE, WiMAX and WLAN Network Design, Optimization and Performance ...
Leonhard Korowajczuk
Jenkins: The Definitive Guide
John Ferguson Smart
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
Apache Maven 3 Cookbook
Srirangan
The Art of Computer Programming: Combinational Algorithms, Part ...
Donald E. Knuth
The Art of Computer Programming (4)
JavaScript: The Definitive Guide
David Flanagan
A Concise Introduction to Logic
Patrick Hurley
Effective Perl Programming: Ways to Write Better, More Idiomatic ...
Joseph N. Hall & Joshua McAdams & Brian D. Foy
Computer Networks
Andrew S. Tanenbaum & David Wetherall
Continuous Delivery: Reliable Software Releases Through Build, ...
Jez Humble & David Farley
UNIX and Linux System Administration Handbook 4th edition
Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley
Brave New World
Aldous Huxley
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Linux Kernel Development
Robert Love
Joseph N. Hall & Joshua A. McAdams & Brian D Foy
CEH Certified Ethical Hacker Study Guide
Kimberly Graves
The Art of Assembly Language
Randall Hyde
The Linux Programming Interface
Michael Kerrisk
Database System Concepts 6th Edition
Abraham Silberschatz & Henry Korth & S. Sudarshan
Bash Pocket Reference
Arnold Robbins
PostgreSQL 9.0 High Performance
Gregory Smith
The Complete Works of Leo Tolstoy (34 Complete Works of Leo ...
Leo Tolstoy
Introduction to Probability Models, Tenth Edition
Sheldon M. Ross
Artificial Intelligence: A Modern Approach
Stuart Jonathan Russell & Peter Norvig
Python Pocket Reference: Python in Your Pocket
Mark Lutz
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ec-Council
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ethical Hacking and Countermeasures: Web Applications and Data ...
Apache Maven 2 Effective Implementation
Brett Porter & Maria Odea Ching
Marijuana Grower's Handbook: Your Complete Guide for Medical ...
Ed Rosenthal & Tommy Chong
Computer Organization and Architecture: Designing for Performance
Modsecurity 2.5
Magnus Mischel
The Illustrated Network: How TCP/IP Works in a Modern Network
Walter Goralski