Assembly Language Step-by-Step
Jeff Duntemann
Hands-On Software Engineering with Python
Brian Allbee
Real-World Bug Hunting
Peter Yaworski
Kali Linux Web Penetration Testing Cookbook
Gilberto Najera Gutierrez
Accelerating Development Velocity Using Docker
Kinnary Jangla
Advanced Penetration Testing
Wil Allsopp
Applied Cryptography
Bruce Schneier
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Beginning Linux Programming
Neil Matthew & Richard Stones
Beginning Modern Unix
Manish Jain
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Essential System Administration
Æleen Frisch
grep Pocket Reference
John Bambenek
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Hands-on Booting
Yogesh Babar
Investigating Cryptocurrencies
Nick Furneaux
Kali Linux 2018
Shiva V. N Parasram & Alex Samm & Lee Allen
Learn Windows PowerShell 3 in a Month of Lunches
Don Jones & Jeffrey Hicks
Learn Windows PowerShell in a Month of Lunches
Don Jones
Linux® All-in-One For Dummies®, 6th Edition
Emmett Dulaney
Linux® BIBLE
Christopher Negus
Linux® Command Line and Shell Scripting Bible
Richard Blum
Linux® Essentials
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux Pocket Guide, 3E
Daniel J. Barrett
Linux Server Security
Chris Binnie
Malware Analyst's Cookbook and DVD
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Mastering Linux Security and Hardening
Donald Tevault
Metasploit Penetration Testing Cookbook
Abhinav Singh
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Practical Reverse Engineering
Bruce Dang
Professional Linux Kernel Architecture
Wolfgang Mauerer
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Reversing
Eldad Eilam
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
The Car Hacker's Handbook
Craig Smith
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook
The Linux Command Line
William E. Shotts, Jr.
Threat Modeling
Adam Shostack
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Using and Administering Linux: Volume 1
David Both
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Thriving in the Community College and Beyond
Joseph B Cuseo & Julie A. McLaughlin & Aaron Thompson & Steady Moono
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Secrets and Lies
RTFM - Red Team Field Manual
Ben Clark
Linux Bible
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
White Space Is Not Your Enemy
Kim Golombisky & Rebecca Hagen
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Digital Forensics and Incident Response
Gerard Johansen
Automate the Boring Stuff with Python, 2nd Edition
Al Sweigart
Cracking Codes with Python
Impractical Python Projects
Lee Vaughan
Invent Your Own Computer Games with Python, 4E
Math Adventures with Python
Peter Farrell
Mission Python
Sean McManus