Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
3D Game Environments
Luke Ahearn
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Practical Mobile Forensics- Third Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik
Mastering Linux Security and Hardening
Donald Tevault
Go Cookbook
Aaron Torres
Privacy Online
Sabine Trepte & Leonard Reinecke
Impractical Python Projects
Lee Vaughan
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Introduction to Java Programming and Data Structures
Comprehensive Version
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Blue Team Field Manual
Alan White
The Linux Command Line
William E. Shotts, Jr.
Onyx Storm (The Empyrean Book 3)
Rebecca Yarros
Python Microservices Development
Tarek Ziade