Advanced Penetration Testing
Wil Allsopp
Security Engineering
Ross J. Anderson
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Migrating to AWS: A Manager's Guide
Jeff Armstrong
Learning Dapr
Haishi Bai & Yaron Schneider
Seeking SRE
David N. Blank-Edelman
Prometheus: Up & Running
Brian Brazil
Red Hat Certified Engineer (Rhce) Ansible Automation Study Guide
Alex Soto Bueno & Andrew Block
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Designing Distributed Systems
Brendan Burns
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & Lachlan Evenson
Learning Helm
Matt Butcher & Matt Farina & Josh Dolitsky
Database Reliability Engineering
Laine Campbell & Charity Majors
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers Red Team
Reliable Machine Learning
Cathy Chen & Niall Richard Murphy & Kranti Parisa & D. Sculley & Todd Underwood
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Modern System Administration
Jennifer Davis
Effective DevOps
Jennifer Davis & Ryn Daniels
Postfix: The Definitive Guide
Kyle D. Dent
Kubernetes Operators
Jason Dobies & Joshua Wood
Network Warrior
Gary A. Donahue
Modernizing Enterprise Java
Markus Eisele & Natale Vinto
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Mastering OpenTelemetry and Observability
Steve Flanders
Investigating Cryptocurrencies
Nick Furneaux
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Cryptography Apocalypse
Roger A. Grimes
Social Engineering
Christopher Hadnagy
Moving Hadoop to the Cloud
Bill Havanki
Implementing Service Level Objectives
Alex Hidalgo
Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Design Patterns for Cloud Native Applications
Kasun Indrasiri & Sriskandarajah Suhothayan
Practical Monitoring
Mike Julian
Consul: Up and Running
Luke Kysow
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
UNIX and Linux System Administration Handbook
Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley
Distributed Tracing in Practice
Austin Parker & Daniel Spoonhower & Rebecca Isaacs & Jonathan Mace
Kubeflow Operations Guide
Josh Patterson & Michael Katzenellenbogen & Austin Harris
DevOps with OpenShift
Stefano Picozzi & Mike Hepburn & Noel O'Connor
Operating OpenShift
Rick Rackow & Manuel Dewald
Security and Microservice Architecture on AWS
Gaurav Raje
Bulletproof SSL and TLS
Ivan Ristic
AWS System Administration
Mike Ryan & Federico Lucifredi
SRE with Java Microservices
Jonathan Schneider
Applied Cryptography
Bruce Schneier
Secrets and Lies
We Have Root
Threat Modeling
Adam Shostack
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
GitOps Cookbook
Natale Vinto & Alex Soto Bueno
Podman in Action
Daniel Walsh
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
XML Schema Essentials
R. Allen Wyke & Andrew Watt
Quarkus in Action
Martin Štefanko & Jan Martiška