Advanced Penetration Testing
Wil Allsopp
Applied Cryptography
Bruce Schneier
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
AWS System Administration
Mike Ryan & Federico Lucifredi
Bulletproof SSL and TLS
Ivan Ristic
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Consul: Up and Running
Luke Kysow
Cryptography Apocalypse
Roger A. Grimes
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Database Reliability Engineering
Laine Campbell & Charity Majors
Design Patterns for Cloud Native Applications
Kasun Indrasiri & Sriskandarajah Suhothayan
Designing Distributed Systems
Brendan Burns
DevOps with OpenShift
Stefano Picozzi & Mike Hepburn & Noel O'Connor
Distributed Tracing in Practice
Austin Parker & Daniel Spoonhower & Rebecca Isaacs & Jonathan Mace
Effective DevOps
Jennifer Davis & Ryn Daniels
GitOps Cookbook
Natale Vinto & Alex Soto Bueno
Implementing Service Level Objectives
Alex Hidalgo
Investigating Cryptocurrencies
Nick Furneaux
Kubeflow Operations Guide
Josh Patterson & Michael Katzenellenbogen & Austin Harris
Kubernetes Operators
Jason Dobies & Joshua Wood
Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & Lachlan Evenson
Learning Dapr
Haishi Bai & Yaron Schneider
Learning Helm
Matt Butcher & Matt Farina & Josh Dolitsky
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Mastering OpenTelemetry and Observability
Steve Flanders
Migrating to AWS: A Manager's Guide
Jeff Armstrong
Modern System Administration
Jennifer Davis
Modernizing Enterprise Java
Markus Eisele & Natale Vinto
Moving Hadoop to the Cloud
Bill Havanki
Network Warrior
Gary A. Donahue
Operating OpenShift
Rick Rackow & Manuel Dewald
Podman in Action
Daniel Walsh
Postfix: The Definitive Guide
Kyle D. Dent
Practical Monitoring
Mike Julian
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Prometheus: Up & Running
Brian Brazil
Quarkus in Action
Martin Štefanko & Jan Martiška
Red Hat Certified Engineer (Rhce) Ansible Automation Study Guide
Alex Soto Bueno & Andrew Block
Reliable Machine Learning
Cathy Chen & Niall Richard Murphy & Kranti Parisa & D. Sculley & Todd Underwood
Secrets and Lies
Security and Microservice Architecture on AWS
Gaurav Raje
Security Engineering
Ross J. Anderson
Seeking SRE
David N. Blank-Edelman
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Social Engineering
Christopher Hadnagy
SRE with Java Microservices
Jonathan Schneider
Threat Modeling
Adam Shostack
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers Red Team
UNIX and Linux System Administration Handbook
Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley
We Have Root
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
XML Schema Essentials
R. Allen Wyke & Andrew Watt