Programming Reactive Extensions and LINQ
Jesse Liberty & Paul Betts
From Mathematics to Philosophy
Hao Wang
Between the Woods and the Water
Patrick Leigh Fermor
101 Things You Thought You Knew About the Titanic . . . ButDidn't!
Tim Maltin & Eloise Aston
The Language Animal: The Full Shape of the Human Linguistic ...
Charles Taylor
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Hacking APIs: Breaking Web Application Programming Interfaces ...
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Application Security Program Handbook: A Guide for Software ...
Derek Fisher
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard
The DevSecOps Playbook: Deliver Continuous Security at Speed
Sean D. Mack
Linux Unveiled: From Novice to Guru
Kameron Hussain & Frahaan Hussain
Defending APIs: Uncover Advanced Defense Techniques to Craft ...
Colin Domoney
Mastering Secure Java Applications: Navigating Security in Cloud ...
Tarun Kumar Chawdhury & Joyanta Banerjee & Vipul Gupta & Debopam Poddar
Security-Driven Software Development: Learn to Analyze and Mitigate ...
Aspen Olmsted
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Grokking Web Application Security
Malcolm McDonald
Cybersecurity Strategies and Best Practices: A Comprehensive ...
Milad Aslaner