Django 2 by Example
Antonio Mele
White Space Is Not Your Enemy
Rebecca Hagen & Kim Golombisky
Introduction to Sociology 2e
Heather Griffiths & Nathan Keirns & Gail Scaramuzzo & Susan Cody-Rydzewski & Eric Strayer & Sally Vyrain
Practical Mobile Forensics- Third Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik
Threat Modeling
Adam Shostack
Secrets and Lies
Bruce Schneier
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Shell Scripting
Steve Parker
Linux Bible
Christopher Negus
Professional Linux Kernel Architecture
Wolfgang Mauerer
Beginning Linux Programming
Neil Matthew & Richard Stones
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Teach Like a Champion 3.0: 63 Techniques That Put Students on ...
Doug Lemov
Investigating Cryptocurrencies
Nick Furneaux
Reversing
Eldad Eilam
Assembly Language Step-by-Step
Jeff Duntemann
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Linux Server Security
Chris Binnie
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Advanced Penetration Testing
Wil Allsopp