Nmap: Network Exploration and Security Auditing Cookbook
Paulino Calderon
Applied Cryptography
Bruce Schneier
Real-World Bug Hunting
Peter Yaworski
Linux Bible
Christopher Negus
Metasploit Penetration Testing Cookbook
Abhinav Singh
The Hacker Playbook
Peter Kim
The Linux Command Line
William E. Shotts, Jr.
Hacking the Cable Modem
DerEngel
Essential System Administration
Æleen Frisch
Gray Hat Python
Justin Seitz
Unauthorised Access
Wil Allsopp
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Professional Linux Kernel Architecture
Wolfgang Mauerer
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Assembly Language Step-by-Step
Jeff Duntemann
Secrets and Lies
Beginning Linux Programming
Neil Matthew & Richard Stones
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Privacy Online
Sabine Trepte & Leonard Reinecke
Shell Scripting
Steve Parker
Reversing
Eldad Eilam
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Think Like a Programmer
V. Anton Spraul
Python for Kids
Jason R. Briggs
Threat Modeling
Adam Shostack
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Black Hat Python
CompTIA Linux+ Guide to Linux Certification
Jason Eckert
Teach Your Kids to Code
Bryson Payne
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Linux Server Security
Chris Binnie
Modern Python Cookbook
Steven F. Lott
Invent Your Own Computer Games with Python, 4E
Al Sweigart
White Space Is Not Your Enemy
Kim Golombisky & Rebecca Hagen
3D Game Environments
Luke Ahearn
Advanced Penetration Testing
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Python High Performance
Gabriele Lanaro
Python Machine Learning by Example
Yuxi (Hayden) Liu
Go Cookbook
Aaron Torres
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Metasploit for Beginners
Sagar Rahalkar
Digital Forensics and Incident Response
Gerard Johansen
Python Microservices Development
Tarek Ziade
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Mastering Linux Security and Hardening
Donald Tevault
Cracking Codes with Python
Practical Mobile Forensics- Third Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
OpenCV 3 Computer Vision with Python Cookbook
Aleksei Spizhevoi & Aleksandr Rybnikov
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
Practical Cyber Intelligence
Wilson Bautista
Raspberry Pi 3 Cookbook for Python Programmers
Dr. Steven Lawrence Fernandes
Investigating Cryptocurrencies
Nick Furneaux
Django 2 by Example
Antonio Mele
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Qt5 Python GUI Programming Cookbook
B.M. Harwani
Mastering Python Networking
Eric Chou
Kali Linux Web Penetration Testing Cookbook
Gilberto Najera Gutierrez
Mission Python
Sean McManus