Mark Loves Life
The Simple Vegan Solution
Mic The Vegan
Whole Vegan Cookbook
effectivedevopswi[..]
Unknown
Embedded Linux Development Using Yocto Project
Otavio Salvador
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Cloud Native with Kubernetes
Alexander Raul
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Continuous Delivery with Docker and Jenkins, Second Edition
Rafał Leszko
Hands-On Kubernetes on Windows
Piotr Tylenda
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Mastering Python for Networking and Security
José Manuel Ortega
Learn Computer Forensics
William Oettinger
CompTIA Security+: SY0-601 Certification Guide Second Edition
Ian Neil
Kubernetes- A Complete DevOps Cookbook
Murat Karslioglu
Learning Malware Analysis
MONNAPPA K A
kubectl: Command-Line Kubernetes in a Nutshell
Rimantas Mocevicius
Learning DevOps
Mikael Krief
Google Cloud for DevOps Engineers
Sandeep Madamanchi
Continuous Delivery with Docker and Jenkins
masteringubuntuse[..] thirdedition
Jay LaCroix
Mastering Malware Analysis
Alexey Kleymenov
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Digital Forensics and Incident Response
Gerard Johansen
Hands-On Docker for Microservices with Python
Jaime Buelta
Learn Kubernetes Security
Kaizhe Huang & Pranjal Jumde
Hands-On Red Team Tactics
Himanshu Sharma
AWS Penetration Testing
Jonathan Helmus
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Hands-On Microservices with Kubernetes
Gigi Sayfan
Learn Docker - Fundamentals of Docker 19.x
Gabriel N. Schenker
Hands-on Kubernetes on Azure, Third Edition
Nills Franssens & Shivakumar Gopalakrishnan & Gunther Lenz
Docker Certified Associate (DCA): Exam Guide
Francisco Javier Ramírez Urea
DevOps Paradox
Viktor Farcic
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
CISA - Certified Information Systems Auditor Study Guide
Hemang Doshi
Mastering Linux Security and Hardening
Donald A. Tevault
Cybersecurity: Attack and Defense Strategies
Yuri Diogenes
Ghidra Software Reverse Engineering for Beginners
A. P. David
DevOps Adoption Strategies: Principles, Processes, Tools, and ...
Martyn Coupland
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Mastering NGINX
Dimitri Aivaliotis