Tomcat, The Definitive Guide, 2008
Unknown
Programming Windows (5th Edition, WinAPI)
Charles Petzold
A Practical Approach & VHDL 9th Edition
O'Reilly - Java Message Service
DevOps for Web Development
Automate it! - Recipes to upskill your business
Chetan Giridhar
Beginning the Linux Command Line
CentOS 6 Linux Server Cookbook
CoreOS Essentials
Designing and Implementing Linux Firewalls and QoS using netfilter, ...
Advanced Bash-Scripting Guide
LinuxTricksandTip[..]
Linux Cookbook
Carla Schroder
Linux Device Drivers, Third Edition
Linux kernel in a nutshell
MariaDB Cookbook
Daniel Bartholomew
MySQL 9.0 Reference Manual - Including MySQL NDB Cluster 9.0
Learning MySQL and MariaDB: Heading in the Right Direction with ...
Russell J.T. Dyer
PHP Reference: Beginner to Intermediate PHP5
Mario Lurig
Learning PHP, MySQL, and JavaScript
Robin Nixon
PHP & MySQL For Dummies, 4th Edition
Janet Valade
PHP Programming Cookbook
Web Code Geeks
Bug Bounty Playbook
joe
Real-World Bug Hunting
Peter Yaworski
The Hacker Playbook 3: Practical Guide To Penetration Testing
Peter Kim
Social Engineering: The Art of Human Hacking
Metasploit for Beginners
Mastering Kali Linux for Advanced Penetration Testing 2nd Edition
Linux Firewalls
Linux Basics for Hackers, 2nd Edition
Kali Linux Revealed
Raphaël Hertzog & Jim O’Gorman & Mati Aharoni
Gray Hat Hacking
Crypto 101
Laurens Van Houtven
Computer Security Fundamentals
Chuck Easttom
CompTIA Security + Certification Guide
Beginning Ethical Hacking with Python
Sanjib Sinha
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Digital Forensics and Incident Respone
Practical Moblie Forensiscs 3rd
Operating System Concepts
Peter Baer Galvin and Greg Gagne Abraham Silberschatz
Foundations of Python Network Programming_ The comprehensive ...
Honeypots and Routers_ Collecting Internet Attacks
Mastering pfSense
Metasploit for Beginners2
Network Analysis Using Wireshark 2 Cookbook
Network Attacks & Exploitation: A Framework
www.it-ebooks.info
Network Security Through Data Analysis
Michael Collins
Nmap Network Exploration and Security Auditing Cookbook 2nd ...
TCP IP 24 hours 6th
Assembly Language for x86 Processors (Sixth edition)
untitled
Learning Malware Analysis
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
The IDA PRO Book
Illfak Guilfanov
Hacking; The Art of Exploration
Jon Erickson
Penetration testing a Hands-on introduction to Hacking
Web Application Security
Andrew Hoffman
Black Hat GraphQL
Nick Aleks & Dolev Farhi
Burp Suite Essentials
Complete Guide to Shodan
Hands-On AWS Penetration Testing with Kali Linux
Modern Web Penetration Testing 2016
The Tangled Web
Michal Zalewski
The Web Application Hacker's Handbook
Daffydd Stutard Marcus Pinto