Information Security Principles and Practice. Oct.2005
TEAM LinG
Hacking Windows XPExtremeTech
Steve. Sinchak
The DevOps Adoption Playbook
Unknown
Introductory Business Statistics 2e
Buy, Rehab, Rent, Refinance, Repeat: The BRRRR Rental Property ...
David M Greene
Python 2.6 Quick Reference
Richard Gruet
Python Testing
Beginner's Guide (2010)
The IDA PRO Book
Illfak Guilfanov
Pro Spring Boot
Frlipe Guiterrez
Gray Hat Python
Python Programming for Hackers & Reverse Engineers (2009)
Advanced Machine Learning with Python
John Hearty
Hello! Raspberry Pi!
Ryan Heitz
Sewing Bits and Pieces - 35 Projects Using Fabric Scraps
Sandi Henderson
Guide to Java Persistence and Hibernate
Sebastian Hennebrueder
"Hello" Environments
Rick Hernandez
Machine Learning: The Ultimate Guide for Beginners to Programming ...
James Herron
Beginning Python from Novice to Pro 2e (Apress, 2008)
Hetland
Mein Kampf(1939)
Adolf Hitler
Web Application Security
Andrew Hoffman
HTML5 and CSS3
Brian P. Hogan
Windows PowerShell Pocket Reference
Lee Holmes
Java SE 8 for the Really Impatient
Cay S. Horstmann
Crypto 101
Laurens Van Houtven
Python
How to Program, 1e (2002)
Java Performance
Charlie Hunt & Binu John
Working with Linux – Quick Hacks for the Command Line
Petru I?fan & Bogdan Vaida
Deep Learning (2017, MIT)
Ian Goodfellow, Yoshua Bengio, Aaron Courville
Mesos in Action
Roger Ignazio
First Time Sewing
Editors of Creative Publishing international
Let's Build a Compiler
Jack W. Crinshaw, P.h.D.
Practical Programming
Jennifer Campbell, Paul Gries, Jason Montojo, Greg Wilson
Bug Bounty Playbook
joe
A Concise Introduction to Data Structures Using Java
Mark Johnson
Sam Patch, the famous jumper
Paul E. Johnson
Learn PowerShell 3 in a Month of Lunches
Jeffery Hicks Don Jones
Medievil Hackers
Eileen Joy
DevOps For Beginners
Joseph Joyner
Java EE 8 Recipes, 2nd Edition
Josh Juneau
Plant Tissue Culture Manual - Supplement 6
K. LINDSEY Department of Biological Sciences, University of ...
Head First Java, 2nd Edition
Kathy Sierra , Bert Bates
Pro JPA 2 in Java EE 8, 3rd Edition
Mike Keith
The C Programming Guide
Brian W. Kernighan
The Linux Programming Interface: A Linux and UNIX System Programming ...
Michael Kerrisk
Fundamentals of Information Systems Security, 4th Edition
David Kim & Michael G. Solomon
The Hacker Playbook 3: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing
Bags - The Modern Classics
Sue Kim
Beginning Python Games Development, Second Edition: With PyGame
Harrison Kinsley & Will McGugan
The Complete America's Test Kitchen TV Show Cookbook 2001--2019
America's Test Kitchen
Kiteworks Best Practices How To Secure Web Forms
Kiteworks
Plants From Test Tubes - An introduction to Microprapagation
Lydiane and John Klenyn
Modern Java Recipes
Ken Kousen
Hacking Exposed - Windows Security Secrets & Solutions
JOEL SCAMBRAY STUART MCCLURE GEORGE KURTZ
HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND ...
Singer
Nancy Langdon
AntiPatterns : Identification, Refactoring, and Management
Phillip A. Laplante & Colin J. Neill
A Java Library of Graph Algorithms and Optimization
Hang T. Lau
Deep Learning in Python: Master Data Science and Machine Learning ...
LazyProgrammer
To Kill A Mockingbird
Harper Lee
Java 7 Pocket Guide
Robert Liguori and Patricia Liguori
Java 1.5 Tiger
lofrumen