Database Reliability Engineering
Laine Campbell & Charity Majors
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Embedded Linux Development Using Yocto Project
Otavio Salvador
Build Android-Based Smart Applications
Chinmoy Mukherjee
Mastering_Linux_S[..] Edition
Donald A. Tevault
DevOps Culture and Practice with OpenShift
Tim Beattie, Mike Hepburn, Noel O’Connor & Dónal Spring
Driving DevOps with Value Stream Management
Cecil 'Gary' Rupp
Kubernetes in Production Best Practices
Aly Saleh & Murat Karslioglu
Google Cloud for DevOps Engineers
Sandeep Madamanchi
DevOps Adoption Strategies: Principles, Processes, Tools, and ...
Martyn Coupland
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Hands-on Kubernetes on Azure, Third Edition
Nills Franssens & Shivakumar Gopalakrishnan & Gunther Lenz
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
The Docker Workshop
Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo & Engy Fouda
Practical Hardware Pentesting
Jean-Georges Valle
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
CISA - Certified Information Systems Auditor Study Guide
Hemang Doshi
AWS Penetration Testing
Jonathan Helmus
masteringubuntuse[..] thirdedition
Jay LaCroix
CompTIA Security+: SY0-601 Certification Guide Second Edition
Ian Neil
Ghidra Software Reverse Engineering for Beginners
A. P. David
Mastering Python for Networking and Security
José Manuel Ortega
Cloud Native with Kubernetes
Alexander Raul
Azure DevOps Explained
Sjoukje Zaal, Stefano Demiliani & Amit Malik
Kubernetes and Docker – An Enterprise Guide
Scott Surovich
kubectl: Command-Line Kubernetes in a Nutshell
Rimantas Mocevicius
Kubernetes- A Complete DevOps Cookbook
Murat Karslioglu
The Kubernetes Workshop
Zachary Arnold, Sahil Dua, Wei Huang, Faisal Masood, Melony ... & Mohammed Abu Taleb
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Docker Certified Associate (DCA): Exam Guide
Francisco Javier Ramírez Urea
Learn Kubernetes Security
Kaizhe Huang & Pranjal Jumde
Mastering Malware Analysis
Alexey Kleymenov
Docker for Developers
Richard Bullington-McGuire, Andrew K. Dennis, Michael Schwartz
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Mastering Azure Security
Mustafa Toroman & Tom Janetscheck
Mastering Kubernetes - Third Edition
Gigi Sayfan
Learn Computer Forensics
William Oettinger
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Hands-On Kubernetes on Windows
Piotr Tylenda
hands-onkubernete[..]
Unknown
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Learn Docker - Fundamentals of Docker 19.x
Gabriel N. Schenker
Mastering Linux Security and Hardening, Second Edition
Cyber Minds
Shira Rubinoff
Serverless Architectures with Kubernetes
Onur Yılmaz & Sathsara Sarathchandra
Hands-On Docker for Microservices with Python
Jaime Buelta
Learn Kali Linux 2019
Glen D. Singh
Learning DevOps
Mikael Krief
DevOps Paradox
Viktor Farcic
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Hands-On Microservices with Kubernetes
Continuous Delivery with Docker and Jenkins, Second Edition
Rafał Leszko
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
hands-oniotsoluti[..]
learnroboticsprog[..]
Mastering Kali Linux for Advanced Penetration Testing, Second ...
Vijay Kumar Velu
Digital Forensics and Incident Response
Gerard Johansen
Learning Malware Analysis
MONNAPPA K A
Practical Cyber Intelligence
Wilson Bautista Jr.
esp8266homeautoma[..]
internetofthingsp[..]
Hands-On Red Team Tactics
Himanshu Sharma