Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Metasploit Penetration Testing Cookbook
Abhinav Singh
Java™ Illuminated
Anderson, Julie & Franceschi, Hervé J.
The Flavor Equation
Nik Sharma
Linux Server Security
Chris Binnie
The Developing Person Through the Life Span
Kathleen Berger
Practical Cyber Intelligence
Wilson Bautista
Honoring the Code
Barton, Matt
Linux Pocket Guide, 3E
Daniel J. Barrett
grep Pocket Reference
John Bambenek
Hands-on Booting
Yogesh Babar
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
Unauthorised Access
Wil Allsopp
Advanced Penetration Testing
Hands-On Software Engineering with Python
Brian Allbee
Nutrition: Science and Everyday Application
Alice Callahan, PhD; Heather Leonard, MEd, RDN; and Tamberly ...
3D Game Environments
Luke Ahearn
Hands-On Data Structures and Algorithms with Python
Dr. Basant Agarwal & Benjamin Baka