Java™ Illuminated
Anderson, Julie & Franceschi, Hervé J.
Unauthorised Access
Wil Allsopp
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Hands-On Data Structures and Algorithms with Python
Dr. Basant Agarwal & Benjamin Baka
Go Cookbook
Aaron Torres
Python Machine Learning by Example
Yuxi (Hayden) Liu
Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Python High Performance
Gabriele Lanaro
Salt, Fat, Acid, Heat
Samin Nosrat
Advanced Penetration Testing
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
3D Game Environments
Luke Ahearn
White Space Is Not Your Enemy
Kim Golombisky & Rebecca Hagen
Blue Team Field Manual
Alan White
Invent Your Own Computer Games with Python, 4E
Al Sweigart
Modern Python Cookbook
Steven F. Lott
Linux® Essentials
Richard Blum
Linux Pocket Guide, 3E
Daniel J. Barrett
Linux Server Security
Chris Binnie
The Car Hacker's Handbook
Craig Smith
The Maker's Guide to the Zombie Apocalypse
Simon Monk
Python Playground
Geeky Projects for the Curious Programmer
The Food Lab: Better Home Cooking Through Science
J. Kenji López-Alt
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Linux® BIBLE
Christopher Negus
Teach Your Kids to Code
Bryson Payne
CompTIA Linux+ Guide to Linux Certification
Jason Eckert
Linux® Command Line and Shell Scripting Bible
Black Hat Python
Justin Seitz
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Mobile & Social Game Design
Fields, Tim; Cotton, Brandon
Threat Modeling
Adam Shostack
RTFM - Red Team Field Manual
Ben Clark
Practical Reverse Engineering
Bruce Dang
Intro to Java Programming, Comprehensive Version
Y. Daniel Liang
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Honoring the Code
Barton, Matt
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Python for Kids
Jason R. Briggs
Learn Windows PowerShell 3 in a Month of Lunches
Don Jones & Jeffrey Hicks
Think Like a Programmer
V. Anton Spraul
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Reversing
Eldad Eilam
Shell Scripting
Steve Parker
Privacy Online
Sabine Trepte & Leonard Reinecke
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Beginning Linux Programming
Neil Matthew & Richard Stones
Learn Windows PowerShell in a Month of Lunches
Don Jones
Secrets and Lies
Bruce Schneier
Assembly Language Step-by-Step
Jeff Duntemann
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Malware Analyst's Cookbook and DVD
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
The Everything Economics Book
David A Mayer
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Professional Linux Kernel Architecture
Wolfgang Mauerer
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Gray Hat Python
grep Pocket Reference
John Bambenek
Essential System Administration
Æleen Frisch