Django 2 by Example
Antonio Mele
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Digital Forensics and Incident Response
Gerard Johansen
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Professional Linux Kernel Architecture
Wolfgang Mauerer
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Metasploit Penetration Testing Cookbook
Abhinav Singh
Mastering Linux Security and Hardening
Donald Tevault
Linux Server Security
Chris Binnie
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Kali Linux Web Penetration Testing Cookbook
Gilberto Najera Gutierrez
Kali Linux 2018
Shiva V. N Parasram & Alex Samm & Lee Allen
Investigating Cryptocurrencies
Nick Furneaux
Hands-on Booting
Yogesh Babar
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Essential System Administration
Æleen Frisch
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Beginning Modern Unix
Manish Jain
Beginning Linux Programming
Neil Matthew & Richard Stones
Assembly Language Step-by-Step
Jeff Duntemann
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Applied Cryptography
Bruce Schneier
Advanced Penetration Testing
Wil Allsopp
Accelerating Development Velocity Using Docker
Kinnary Jangla