Microservices Best Practices for Java
IBM
Making Use of Python (2002)
Unknown
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
Windows Forensics Analysis
Around the World in Eighty Days
Jules Verne
The Adventures of Tom Sawyer, Complete
Mark Twain
Adventures of Huckleberry Finn
Moby Dick; Or, The Whale
Herman Melville
The Jungle Book
Rudyard Kipling
The Count of Monte Cristo
Alexandre Dumas & Auguste Maquet