Java für Dummies
Barry Burd
Das Inoffizielle - Fritz-Box-Experim[..]
Buch
Laravel Application Development Blueprints
Kilidagi, Arda
Android App Entwicklung für Dummies
Burton Michael, Felker Donn
Microsoft Word - Win2K Command Pocket Reference.doc
Caudex
pxcollin
Vagrant Virtual Development Environment Cookbook
Chad Thompson
The Grumpy Programmer's Guide To Building Testable PHP Applications
Chris Hartjes
Getting Stuff Done with Laravel 4
Chuck Heintzelman
datascienceforiot[..]
Unknown
Keycloak - Identity and Access Management for Modern Applications: ...
Stian Thorgersen & Pedro Igor Silva
Threat Hunting with Elastic Stack
Andrew Pease
Privilege Escalation Techniques
Alexis Ahmed
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Practical Hardware Pentesting
Jean-Georges Valle
Pentesting Industrial Control Systems
Paul Smith
Penetration Testing Azure for Ethical Hackers
David Okeyode , Karl Fosaaen
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Mastering Palo Alto Networks
Tom Piens
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff , Per Larsen
Mastering Kali Linux for Advanced Penetration
Vijay Kumar Velu
Mastering Defensive Security
Cesar Bravo
Malware Analysis Techniques
Dylan Barker
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Cybersecurity Career Master Plan
Dr. Gerald Auger , Jaclyn "Jax" Scott , Jonathan Helmus , Kim ...
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya
Adversarial Tradecraft in Cybersecurity
Dan Borges
Learn C Programming
Jeff Szuhay
Learn Java 17 Programming, Second Edition
Nick Samoylov
Applied Computational Thinking with Python
Sofía De Jesús & Dayrene Martinez
Hands-on Design Patterns and Best Practices with Julia
Tom Kwong
Applying Math with Python
Sam Morley
The Complete Coding Interview Guide in Java
Anghel Leonard
Kotlin Design Patterns and Best Practices
Alexey Soshin
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Android Programming for Beginners - Second Edition
Android Developement with Kotlin
Marcin Moskala
Android Application Development Cookbook Second Edition
40 Algorithms Every Programmer Should Know
Imran Ahmad
Mastering Magento
Bret Williams
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Natural Language Processing Fundamentals for Developers
Oswald Campesato
Data Science for IoT Engineers
P. G. Madhavan
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Data Analytics
Christopher Greco
Fintech Fundamentals
Len Mei, Ph.D.
Wireless Sensor Networks
S. R. Vijayalakshmi & S. Muruganand
Tech Trends Industrial Revolution
Dong-Jin Pyo, Jaejin Hwang & Youngjin Yoon
Data Visualization for Business Decisions
Andres Fortino
Software Quality Assurance
Rajiv Chopra
Empirical Cloud Security: Practical Intelligence to Evaluate ...
Aditya K. Sood
Data Cleaning
Raspberry Pi 3 Cookbook for Python Programmers
Tim Cox