Gray Hat Python
Python Programming for Hackers & Reverse Engineers (2009)
Deep Learning (2017, MIT)
Ian Goodfellow, Yoshua Bengio, Aaron Courville
Engineers mini-Notebook - 555 timer circuits
Forest Mims
Hacking Windows XPExtremeTech
Steve. Sinchak
OpenCV Computer Vision with Python
Unknown
OCAJP Oracle Certified Associate Java SE 7 Programmer Practice ...
Hanumant Deshmukh
OCA Oracle Certified Associate Java SE 8 Programmer I Study ...
Jeane Boyarsky
OCA Java SE 7 Programmer I Certification Guide
www.it-ebooks.info
Object-Oriented Software Construction
Object Oriented Programming Languages, Interpretation, 2007
O'Reilly - Java™ Extreme Programming Cookbook
Brian M. Coyner Eric M. Burke
O'Reilly - Java Message Service
O'Reilly - Head First Object-Oriented Analysis & Design
Brett McLaughlin & Gary Pollice & David West
Numerical Methods in Engineering with Python (2005)
Nmap Network Exploration and Security Auditing Cookbook 2nd ...
Nmap Essentials
The Newbie's guide to microgreens
REACT Green
Network Security Through Data Analysis
Michael Collins
Network Basics for Hackers
Zamzar
Network Attacks & Exploitation: A Framework
Network Analysis Using Wireshark 2 Cookbook
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source ...
Archibald
Natural Language Processing with Python (2009)
Narrative of the life of Frederick Douglass, an American slave
Frederick Douglass
Narrative of the life and adventures of Henry Bibb, an American ...
Bibb & Henry
A Narrative of the Adventures and Escape of Moses Roper from ...
Thomas Price Moses Roper
Narrative of James Williams, an American slave, who was for ...
Williams & James
MySQL 9.0 Reference Manual - Including MySQL NDB Cluster 9.0
MySQL
Wikibooks
Mollie Makes Presents - Simple Sewing - October 2025
Molkentin - The Book of Qt 4
The Art of Building Qt Applications (No Starch Press, 2007)
Modern Web Penetration Testing 2016
Modern Web Penetration Testing
Modern Java Recipes
Ken Kousen
Modern C++ Design
Andrei Alexandrescu
Mobile Python
Rapid Prototyping of Applications on the Mobile Platform (2007)
Mobile and Wireless Network Security and Privacy
ML Machine Learning-A Probabilistic Perspective
Kevin P Murphy
Minter_685-4FRONT.fm
Susan Stevens
Microsoft Word - Data Structures & Algorithms in Java -- SAMS.doc
root
Microsoft Word - Active Defense . A Comprehensive Guide to Network ...
Microservices Best Practices for Java
IBM
Microgreens Growing Guide
Scintilla Farms
Michael
Mastering UNIX Shell Scripting (Wiley, 2003)
Metasploit for Beginners2
Metasploit for Beginners
Metasploit
HD Moore
Mesos in Action
Roger Ignazio
Mein Kampf(1939)
Adolf Hitler
Medievil Hackers
Eileen Joy
Mayflower
Nathaniel Philbrick
Maximum Security: A Hacker's Guide to Protecting Your Internet ...
Maxim Lapan - Deep Reinforcement Learning Hands-On_ Apply modern ...
PACKT Publishing
Matplotlib for Python Developers (2009)
MATLAB C-C++, Fortran, Java, and Python API Reference - 2019
Mathematics for Business and Social Sciences
Kathryn Bollinger and Vanessa Coffelt
Mastering Unit Testing Using Mockito and JUnit
Mastering RabbitMQ
Mastering pfSense
Mastering Linux Shell Scripting
Mastering Linux
Mastering Kali Linux for Advanced Penetration Testing 2nd Edition
Mastering Kali Linux for Advanced Penetration Testing
MariaDB Cookbook
Daniel Bartholomew