24 Deadly Sins of Software Security: Programming Flaws and How to Fix ThemMichael Howard, David LeBlanc, John ViegaSeptember 3, 2009
Achieving Extreme Performance with Oracle ExadataRick Greenwald, Robert Stackowiak, Maqsood Alam, Mans BhullerFebruary 11, 2011
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Wrightson, Tyler December 15, 2014
Advanced Tuning for JD Edwards EnterpriseOne ImplementationsMichael Jacot, Allen Jacot, Frank Jordan, Gurbinder Bali, Patrick Scott, Kyle KinderJune 25, 2013
Applied Oracle Security: Developing Secure Database and Middleware EnvironmentsDavid Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan WiseSeptember 28, 2009
Applied SAP BI 7.0 Web Reports: Using BEx Web Analyzer and Web Application DesignerPeter JonesMarch 15, 2010
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions Bambara, Joseph J. Allen, Paul R. Iyer, Kedar , Madsen, René , Lederer, Solomon , Wuehler, Michael February 16, 2018
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments Messier, Ric February 28, 2020
Building and Managing a Cloud Using Oracle Enterprise Manager 12cMadhup Gulati, Adeesh Fulay, Sudip DattaFebruary 13, 2013
Building Integrated Business Intelligence Solutions with SQL Server 2008 R2 & Office 2010Philo Janus, Stacia MisnerFebruary 3, 2011
Business Intelligence with Microsoft® Office PerformancePoint™ Server 2007Craig UtleyJanuary 22, 2008