Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Salt, Fat, Acid, Heat
Samin Nosrat
Onyx Storm (The Empyrean Book 3)
Rebecca Yarros
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Raymond Nutting
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook
Sociology in a Changing World
William Kornblum
Django 2 Web Development Cookbook
Jake Kronika & Aidas Bendoraitis
Python Deep Learning Projects
Matthew Lamons & Rahul Kumar & Abhishek Nagaraja
Python High Performance
Gabriele Lanaro
The UX Careers Handbook
Cory Lebson
Teach Like a Champion 3.0: 63 Techniques That Put Students on ...
Doug Lemov
Intro to Java Programming, Comprehensive Version
Y. Daniel Liang
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Python Machine Learning by Example
Yuxi (Hayden) Liu
Modern Python Cookbook
Steven F. Lott
The Food Lab: Better Home Cooking Through Science
J. Kenji López-Alt
Technical Writing for Business People
Carrie Marshall
Python Crash Course, 2nd Edition
Eric Matthes
Beginning Linux Programming
Neil Matthew & Richard Stones
Professional Linux Kernel Architecture
Wolfgang Mauerer
The Everything Economics Book
David A Mayer
Mission Python
Sean McManus
Django 2 by Example
Antonio Mele
Malware Analyst's Cookbook and DVD
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
The Maker's Guide to the Zombie Apocalypse
Simon Monk
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Linux® BIBLE
Christopher Negus
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Linux Bible
Kali Linux 2018
Shiva V. N Parasram & Alex Samm & Lee Allen
Shell Scripting
Steve Parker
Teach Your Kids to Code
Bryson Payne
Real-World Bug Hunting
Peter Yaworski
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Python 3 Object-Oriented Programming
Dusty Phillips
Python Playground
Geeky Projects for the Curious Programmer
Metasploit for Beginners
Sagar Rahalkar
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Applied Cryptography
Bruce Schneier
Secrets and Lies
Black Hat Python
Justin Seitz
Gray Hat Python
Python for Informatics
Charles Severance
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
The Flavor Equation
Nik Sharma
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Threat Modeling
Adam Shostack
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Metasploit Penetration Testing Cookbook
Abhinav Singh
The Car Hacker's Handbook
Craig Smith
OpenCV 3 Computer Vision with Python Cookbook
Aleksei Spizhevoi & Aleksandr Rybnikov
Think Like a Programmer
V. Anton Spraul
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Automate the Boring Stuff with Python, 2nd Edition
Al Sweigart
Cracking Codes with Python
Invent Your Own Computer Games with Python, 4E
Practical Mobile Forensics- Third Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik