Penetration testing a Hands-on introduction to Hacking
Unknown
Learning Malware Analysis
untitled
Assembly Language for x86 Processors (Sixth edition)
TCP IP 24 hours 6th
Nmap Network Exploration and Security Auditing Cookbook 2nd ...
Network Analysis Using Wireshark 2 Cookbook
Metasploit for Beginners2
Mastering pfSense
Honeypots and Routers_ Collecting Internet Attacks
Foundations of Python Network Programming_ The comprehensive ...
Practical Moblie Forensiscs 3rd
Digital Forensics and Incident Respone
CompTIA Security + Certification Guide
Gray Hat Hacking
Linux Basics for Hackers, 2nd Edition
Linux Firewalls
Mastering Kali Linux for Advanced Penetration Testing 2nd Edition
Metasploit for Beginners
Social Engineering: The Art of Human Hacking
MySQL 9.0 Reference Manual - Including MySQL NDB Cluster 9.0
Linux kernel in a nutshell
Linux Device Drivers, Third Edition
LinuxTricksandTip[..]
Advanced Bash-Scripting Guide
Designing and Implementing Linux Firewalls and QoS using netfilter, ...
CoreOS Essentials
CentOS 6 Linux Server Cookbook
Beginning the Linux Command Line
DevOps for Web Development
DevOps for Networking
DevOps Automation Cookbook
DevOps on the Microsoft Stack
Developing Microservices with Node.js
Infrastructure as Code (IAC) Cookbook
Implementing DevOps on AWS
GNU Linux Advanced Administration
Getting Started with tmux
Learning Linux Shell Scripting
Learning Continuous Integration with Jenkins
Jenkins Essentials
Linux Thin Client Networks Design and Deployment
Linux Shell Scripting Cookbook
Linux Networking Cookbook
Linux Mint Essentials
Linux Email - Second Edition
Mastering Linux
Mastering Linux Shell Scripting
Linux in a Nutshell, 6th Edition
PowerShell Succinctly
Nmap Essentials
SELinux System Administration - Second Edition
Pro Continuous Delivery - With Jenkins 2.0
Pro Bash Programming
Practical Microservices
Practical DevOps
PowerShell in Depth
The Linux Command Line - A Complete Introduction
The DevOps Adoption Playbook