Introduction to Botany
Alexey Shipunov
Writing Guide with Handbook
Unknown
Automate it! - Recipes to upskill your business
Chetan Giridhar
Python GUI: Develop Android Applications using Python, Qt and ...
Olaf Art Ananda
Learning Linux Shell Scripting
Getting Started with tmux
GNU Linux Advanced Administration
Implementing DevOps on AWS
Implementing Modern DevOps: Enabling IT organizations to deliver ...
David Gonzalez
Infrastructure as Code (IAC) Cookbook
Developing Microservices with Node.js
DevOps on the Microsoft Stack
DevOps Automation Cookbook
DevOps Bootcamp
Mitesh Soni
DevOps For Beginners
Joseph Joyner
DevOps for Networking
DevOps for Web Development
Beginning the Linux Command Line
CentOS 6 Linux Server Cookbook
CoreOS Essentials
Designing and Implementing Linux Firewalls and QoS using netfilter, ...
Advanced Bash-Scripting Guide
LinuxTricksandTip[..]
Linux Cookbook
Carla Schroder
Linux Device Drivers, Third Edition
Linux kernel in a nutshell
MariaDB Cookbook
Daniel Bartholomew
MySQL 9.0 Reference Manual - Including MySQL NDB Cluster 9.0
Learning PHP, MySQL, and JavaScript
Robin Nixon
PHP Programming Cookbook
Web Code Geeks
Bug Bounty Playbook
joe
Real-World Bug Hunting
Peter Yaworski
The Hacker Playbook 3: Practical Guide To Penetration Testing
Peter Kim
Social Engineering: The Art of Human Hacking
Metasploit for Beginners
Mastering Kali Linux for Advanced Penetration Testing 2nd Edition
Linux Firewalls
Linux Basics for Hackers, 2nd Edition
Gray Hat Hacking
Crypto 101
Laurens Van Houtven
Computer Security Fundamentals
Chuck Easttom
CompTIA Security + Certification Guide
Beginning Ethical Hacking with Python
Sanjib Sinha
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Digital Forensics and Incident Respone
Practical Moblie Forensiscs 3rd
Operating System Concepts
Peter Baer Galvin and Greg Gagne Abraham Silberschatz
Foundations of Python Network Programming_ The comprehensive ...
Honeypots and Routers_ Collecting Internet Attacks
Mastering pfSense
Metasploit for Beginners2
Network Analysis Using Wireshark 2 Cookbook
Network Security Through Data Analysis
Michael Collins
Nmap Network Exploration and Security Auditing Cookbook 2nd ...
TCP IP 24 hours 6th
untitled
Learning Malware Analysis
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
The IDA PRO Book
Illfak Guilfanov
Penetration testing a Hands-on introduction to Hacking
Web Application Security
Andrew Hoffman
Black Hat GraphQL
Nick Aleks & Dolev Farhi
Burp Suite Essentials