| Jan 02, 2026 | 97 Things Every Application Security Professional Should Know |
| Jan 02, 2026 | Компьютерная графика |
| Jan 02, 2026 | Security and Microservice Architecture on AWS |
| Jan 02, 2026 | Are Your Lights On? |
| Jan 02, 2026 | Стандарты программирования на С++. 101 правило и рекомендация |
| Jan 02, 2026 | Software Engineering at Google |
| Jan 02, 2026 | Software Supply Chain Security |
| Jan 02, 2026 | Practical Data Privacy |
| Jan 02, 2026 | Intelligence-Driven Incident Response |
| Jan 02, 2026 | Cloud Native Security Cookbook |
| Jan 02, 2026 | Microservices: From Design to Deployment |
| Jan 02, 2026 | Cybersecurity Ops with bash |
| Jan 02, 2026 | Security Architecture for Hybrid Cloud |
| Jan 02, 2026 | Web Application Security |
| Jan 02, 2026 | Network Programmability and Automation |
| Jan 02, 2026 | Структуры данных и алгоритмы |
| Jan 02, 2026 | Новые сложные задачи на С++ |
| Jan 02, 2026 | Современное проектирование на С++ |
| Jan 02, 2026 | Clean Architecture: A Craftsman's Guide to Software Structure and Design (Robert C. Martin Series) |
| Jan 02, 2026 | SYSTEMANTICS. THE SYSTEMS BIBLE |
| Jan 02, 2026 | Zero Trust Networks |
| Jan 02, 2026 | Learning DevSecOps |
| Jan 02, 2026 | The Developer’s Playbook for Large Language Model Security |
| Jan 02, 2026 | Hacker Culture A to Z |
| Jan 02, 2026 | Artificial Intelligence: A Modern Approach |
| Jan 02, 2026 | Practicing Trustworthy Machine Learning |
| Jan 02, 2026 | Inside Cyber Warfare |
| Jan 02, 2026 | Adversary Emulation with MITRE ATT&CK |
| Jan 02, 2026 | Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow |
| Jan 02, 2026 | Building a Cyber Risk Management Program |
| Jan 02, 2026 | The Cybersecurity Manager’s Guide |
| Jan 02, 2026 | Practical Cloud Security |
| Jan 02, 2026 | Defensive Security Handbook |
| Jan 02, 2026 | Policy as Code |