Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
Practical Reverse Engineering
Bruce Dang
Introduction to Java Programming and Data Structures
Comprehensive Version
grep Pocket Reference
John Bambenek
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook
Sociology in a Changing World
William Kornblum
Django 2 Web Development Cookbook
Jake Kronika & Aidas Bendoraitis
Python Deep Learning Projects
Matthew Lamons & Rahul Kumar & Abhishek Nagaraja
Python High Performance
Gabriele Lanaro
The UX Careers Handbook
Cory Lebson
Teach Like a Champion 3.0: 63 Techniques That Put Students on ...
Doug Lemov
Intro to Java Programming, Comprehensive Version
Y. Daniel Liang
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Python Machine Learning by Example
Yuxi (Hayden) Liu
Modern Python Cookbook
Steven F. Lott
The Food Lab: Better Home Cooking Through Science
J. Kenji López-Alt
Technical Writing for Business People
Carrie Marshall
Python Crash Course, 2nd Edition
Eric Matthes
Beginning Linux Programming
Neil Matthew & Richard Stones
Professional Linux Kernel Architecture
Wolfgang Mauerer
The Everything Economics Book
David A Mayer
Mission Python
Sean McManus
Django 2 by Example
Antonio Mele
Malware Analyst's Cookbook and DVD
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
The Maker's Guide to the Zombie Apocalypse
Simon Monk
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Linux® BIBLE
Christopher Negus
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Linux Bible
Salt, Fat, Acid, Heat
Samin Nosrat
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Raymond Nutting
Kali Linux 2018
Shiva V. N Parasram & Alex Samm & Lee Allen
Shell Scripting
Steve Parker
Teach Your Kids to Code
Bryson Payne
Real-World Bug Hunting
Peter Yaworski
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Python 3 Object-Oriented Programming
Dusty Phillips
Python Playground
Geeky Projects for the Curious Programmer
Metasploit for Beginners
Sagar Rahalkar
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Applied Cryptography
Bruce Schneier
Secrets and Lies
Black Hat Python
Justin Seitz
Gray Hat Python
Python for Informatics
Charles Severance
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
The Flavor Equation
Nik Sharma
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Threat Modeling
Adam Shostack
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Metasploit Penetration Testing Cookbook
Abhinav Singh
The Car Hacker's Handbook
Craig Smith
OpenCV 3 Computer Vision with Python Cookbook
Aleksei Spizhevoi & Aleksandr Rybnikov
Think Like a Programmer
V. Anton Spraul
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Automate the Boring Stuff with Python, 2nd Edition
Al Sweigart
Cracking Codes with Python
Invent Your Own Computer Games with Python, 4E
Practical Mobile Forensics- Third Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik