Hands-On Network Programming With C# and .NET Core: Build Robust ...
Sean Burns
Psych Experiments: From Pavlov's Dogs to Rorschach's Inkblots, ...
Michael A Britt
Soldier of Rome: The Centurion (The Artorian Chronicles)
James Mace
Sanctuary
T. W. Piperbrook
Contamination (6)
Books of the Dead (Book 1): Sanctuary From The Dead
Spears, R.J.
Books of the Dead (1)
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Darril Gibson
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer ...
Cliff Stoll
Gray Hat Python: Python Programming for Hackers and Reverse ...
Justin Seitz
Black Hat Python: Python Programming for Hackers and Pentesters
Secure Coding in C and C++
Robert C. Seacord Seacord
So You Want To Be A Wizard
Julia Evans
Spying Programs Strace
Profiling Tracing Perf
Networking Ack
Lets Learn Tcpdump
Linux Debugging Tools
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
Linux Firewalls: Attack Detection and Response
Michael Rash
Practical LPIC-1 Linux Certification Study Guide
David Clinton