The Ultimate Docker Container Book - Build test ship and run containers with Docker and Kubernetes
Dr. Gabriel N. Schenker
Machine Learning Engineering with Python - Manage the lifecycle of machine learning models using MLOps with practical examples
Andrew P. McMahon
Learn Ethereum - A practical guide to help developers set up and run decentralized applications with Ethereum 20
Xun (Brian) Wu, Zhihong Zou, Dongying Song
Et al - Because not all research deserves a Nobel Prize
B McGraw
A Handbook of Mathematical Models with Python - Elevate your machine learning projects with NetworkX PuLP and linalg
Dr. Ranja Sarkar
Unreal Engine 5 Game Development with C++ Scripting - Become a professional game developer and create fully functional high-quality games
Zhenyu George Li
Layered Design for Ruby on Rails Applications - Discover practical design patterns for maintainable web applications
Vladimir Dementyev
Serverless Machine Learning with Amazon Redshift ML - Create train and deploy machine learning models using familiar SQL commands
Debu Panda, Phil Bates, Bhanu Pittampally, Sumeet Joshi
Mastering Tableau 2023 - Implement advanced business intelligence techniques analytics and machine learning models with Tableau
Marleen Meier
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Extending Microsoft Business Central with Power Platform - Leverage Power Platform to create scalable Business Central solutions with high business value
Kim Congleton, Shawn Sissenwein
Designing and Implementing Microsoft Azure Networking Solutions - Exam Ref AZ-700 preparation guide
David Okeyode
Cloud Native Software Security Handbook - Unleash the power of cloud native tools for robust security in modern applications
Mihir Shah
Automate It with Zapier and Generative AI - Harness the power of no-code workflow automation and AI with Zapier to increase business productivity
Kelly Goss
Attacking and Exploiting Modern Web Applications - Discover the mindset techniques and tools to perform modern web attacks and exploitation
Simone Onofri, Donato Onofri
Practical Game Design - A modern and comprehensive guide to video game design
Ennio De Nucci, Adam Kramarzewski
Unleashing the Power of UX Analytics - Proven techniques and strategies for uncovering user insights to deliver a delightful user experience
Jeff Hendrickson, Travis Wissink
Strategizing Continuous Delivery in the Cloud - Implement continuous delivery using modern cloud-native technology
Thomas Schutz, Garima Bajpai
Microsoft 365 Security Compliance and Identity Administration - Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
Peter Rising
Designing the Adobe InDesign Way - Explore 100+ recipes for creating stunning layouts with the leading desktop publishing software
Andy Gardner
PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers
Miriam C. Wiesner
Godot 4 Game Development Projects - Build five cross-platform 2D and 3D games using one of the most powerful open source game engines
Chris Bradfield
Supercharging Productivity with Trello - Harness Trello's powerful features to boost productivity and team collaboration
Brittany Joiner
Optimizing Microsoft Azure Workloads - Leverage the Well-Architected Framework to boost performance scalability and cost efficiency
Rithin Skaria
The Art of Crafting User Stories - Unleash creativity and collaboration to deliver high-value products with a delightful user experience
Christopher Lee
Mastering Information Security Compliance Management - A comprehensive handbook on ISO IEC 27001:2022 compliance
Adarsh Nair, Greeshma M. R.
Technology Operating Models for Cloud and Edge - Create your purpose-built distributed operating model for public hybrid multicloud and edge
Ahilan Ponnusamy, Andreas Spanner
The Ultimate iOS Interview Playbook - Conquer Swift frameworks design patterns and app architecture for your dream job
Avi Tsadok
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Responsible AI in the Enterprise - Practical AI risk management for explainable auditable and safe models with hyperscalers and Azure OpenAI
Adnan Masood, Heather Dawe