Applied Cryptography
Bruce Schneier
Free Executive Summary
Leona Coffee
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Automate the Boring Stuff with Python, 2nd Edition
Al Sweigart
Cracking Codes with Python
Invent Your Own Computer Games with Python, 4E
Practical Mobile Forensics- Third Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik
Mastering Linux Security and Hardening
Donald Tevault
Go Cookbook
Aaron Torres
Privacy Online
Sabine Trepte & Leonard Reinecke
Impractical Python Projects
Lee Vaughan
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Introduction to Java Programming and Data Structures
Comprehensive Version
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
CCNA 200-301 Official Cert Guide, Volume 2
Wendell Odom
Blue Team Field Manual
Alan White
The Linux Command Line
William E. Shotts, Jr.
Onyx Storm (The Empyrean Book 3)
Rebecca Yarros
Python Microservices Development
Tarek Ziade