Hunting the Eagles
Ben Kane
Zombie Theorem (Book 2): The Siege
Wallace, James
Zombie Theorem (2)
Profiling Tracing Perf
Julia Evans
Jet Set : The People, the Planes, the Glamour, and the Romance ...
Stadiem, William
Hands-On Domain-Driven Design With .NET Core: Tackling Complexity ...
Alexey Zimarev
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer ...
Cliff Stoll
Linux Firewalls: Attack Detection and Response
Michael Rash
Gray Hat Python: Python Programming for Hackers and Reverse ...
Justin Seitz
Secure Coding in C and C++
Robert C. Seacord Seacord
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
Black Hat Python: Python Programming for Hackers and Pentesters
Practical LPIC-1 Linux Certification Study Guide
David Clinton
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Darril Gibson
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Linux Debugging Tools
Spying Programs Strace
Networking Ack
Lets Learn Tcpdump
So You Want To Be A Wizard
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann