Mission Python
Sean McManus
The Hardware Hacker
Andrew Bunnie Huang
Assembly Language Step-by-Step
Jeff Duntemann
The Everything Economics Book
David A Mayer
Think Like a Programmer
V. Anton Spraul
Real-World Bug Hunting
Peter Yaworski
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos ...
Gray Hat Python
Justin Seitz
Black Hat Python
Teach Your Kids to Code
Bryson Payne
Serious Python
Julien Danjou
Python for Kids
Jason R. Briggs
Python Playground
Geeky Projects for the Curious Programmer
Python Crash Course, 2nd Edition
Eric Matthes
Math Adventures with Python
Peter Farrell
Invent Your Own Computer Games with Python, 4E
Al Sweigart
Impractical Python Projects
Lee Vaughan
Cracking Codes with Python
Automate the Boring Stuff with Python, 2nd Edition
Digital Forensics and Incident Response
Gerard Johansen
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
White Space Is Not Your Enemy
Kim Golombisky & Rebecca Hagen
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Linux Bible
Christopher Negus
RTFM - Red Team Field Manual
Ben Clark
Secrets and Lies
Bruce Schneier
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Thriving in the Community College and Beyond
Joseph B Cuseo & Julie A. McLaughlin & Aaron Thompson & Steady Moono
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Using and Administering Linux: Volume 1
David Both
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Threat Modeling
Adam Shostack
The Linux Command Line
William E. Shotts, Jr.
The Hacker Playbook
Peter Kim
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Car Hacker's Handbook
Craig Smith
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
Reversing
Eldad Eilam
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Professional Linux Kernel Architecture
Wolfgang Mauerer
Practical Reverse Engineering
Bruce Dang
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Metasploit Penetration Testing Cookbook
Abhinav Singh
Mastering Linux Security and Hardening
Donald Tevault
Malware Analyst's Cookbook and DVD
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Linux Server Security
Chris Binnie
Linux Pocket Guide, 3E
Daniel J. Barrett
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux® Essentials
Richard Blum
Linux® Command Line and Shell Scripting Bible
Linux® BIBLE
Linux® All-in-One For Dummies®, 6th Edition
Emmett Dulaney
Learn Windows PowerShell in a Month of Lunches
Don Jones
Learn Windows PowerShell 3 in a Month of Lunches
Don Jones & Jeffrey Hicks
Kali Linux Web Penetration Testing Cookbook
Gilberto Najera Gutierrez
Kali Linux 2018
Shiva V. N Parasram & Alex Samm & Lee Allen
Investigating Cryptocurrencies
Nick Furneaux
Hands-on Booting
Yogesh Babar