Linux® BIBLE
Christopher Negus
Mastering Python Networking
Eric Chou
Java How to Program, Early Objects, EBook, Global Edition
Deitel, Harvey; Deitel, Paul;
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Metasploit Penetration Testing Cookbook
Abhinav Singh
Let's Go!
Alex Edwards
Research Methods for the Social Sciences: An Introduction
An Introduction
Free Executive Summary
Leona Coffee
Applied Cryptography
Bruce Schneier
The Hacker Playbook
Peter Kim
The Linux Command Line
William E. Shotts, Jr.
Hacking the Cable Modem
DerEngel
Python for Informatics
Charles Severance
Technical Writing for Business People
Carrie Marshall
Onyx Storm (The Empyrean Book 3)
Rebecca Yarros
Essential System Administration
Æleen Frisch
grep Pocket Reference
John Bambenek
Gray Hat Python
Justin Seitz
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Unauthorised Access
Wil Allsopp
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Professional Linux Kernel Architecture
Wolfgang Mauerer
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
The Everything Economics Book
David A Mayer
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
Malware Analyst's Cookbook and DVD
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Assembly Language Step-by-Step
Jeff Duntemann
Secrets and Lies
Learn Windows PowerShell in a Month of Lunches
Don Jones
Beginning Linux Programming
Neil Matthew & Richard Stones
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Privacy Online
Sabine Trepte & Leonard Reinecke
Shell Scripting
Steve Parker
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Reversing
Eldad Eilam
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Think Like a Programmer
V. Anton Spraul
Learn Windows PowerShell 3 in a Month of Lunches
Don Jones & Jeffrey Hicks
Python for Kids
Jason R. Briggs
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Honoring the Code
Barton, Matt
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Intro to Java Programming, Comprehensive Version
Y. Daniel Liang
Practical Reverse Engineering
Bruce Dang
RTFM - Red Team Field Manual
Ben Clark
Threat Modeling
Adam Shostack
Mobile & Social Game Design
Fields, Tim; Cotton, Brandon
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Black Hat Python
Linux® Command Line and Shell Scripting Bible
Richard Blum
CompTIA Linux+ Guide to Linux Certification
Jason Eckert
Teach Your Kids to Code
Bryson Payne
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Food Lab: Better Home Cooking Through Science
J. Kenji López-Alt
Python Playground
Geeky Projects for the Curious Programmer
The Maker's Guide to the Zombie Apocalypse
Simon Monk
The Car Hacker's Handbook
Craig Smith
Linux Server Security
Chris Binnie
Linux Pocket Guide, 3E
Daniel J. Barrett
Linux® Essentials
Modern Python Cookbook
Steven F. Lott