Mastering Kali Linux for Advanced Penetration Testing
Unknown
The Strange Case of Dr. Jekyll and Mr. Hyde
Robert Louis Stevenson
HTML5 & CSS3 in The Real World
Essential Skills for Hackers
Kevin Cardwell
Mastering Linux Shell Scripting
Mastering pfSense
Mastering RabbitMQ
PACKT Publishing
Mastering Spring 5.0
Mastering Unit Testing Using Mockito and JUnit
Mastering Windows Server® 2012 R2
Mark Minasi & Kevin Greene & Christian Booth & Robert Butler & John McCabe & Robert Panek & Michael Rice & Stefan Roth
MATLAB C-C++, Fortran, Java, and Python API Reference - 2019
Matplotlib for Python Developers (2009)
Maxim Lapan - Deep Reinforcement Learning Hands-On_ Apply modern ...
Maximum Security: A Hacker's Guide to Protecting Your Internet ...
Medievil Hackers
Eileen Joy
Mein Kampf(1939)
Adolf Hitler
Mending Matters
Katrina Rodabaugh
Mesos in Action
Roger Ignazio
Metasploit
HD Moore
Metasploit for Beginners
Metasploit for Beginners2
Michael
Mastering UNIX Shell Scripting (Wiley, 2003)
Microgreens Growing Guide
Scintilla Farms
Microservices Best Practices for Java
IBM
Microsoft Word - Active Defense . A Comprehensive Guide to Network ...
root
Microsoft Word - Data Structures & Algorithms in Java -- SAMS.doc
Minter_685-4FRONT.fm
Susan Stevens
Les Misérables
Victor Hugo
ML Machine Learning-A Probabilistic Perspective
Kevin P Murphy
Mobile and Wireless Network Security and Privacy
Mobile Python
Rapid Prototyping of Applications on the Mobile Platform (2007)
Moby Dick; Or, The Whale
Herman Melville
Modern C++ Design
Andrei Alexandrescu
Modern Java Recipes
Ken Kousen
Modern Web Penetration Testing
Modern Web Penetration Testing 2016
Molkentin - The Book of Qt 4
The Art of Building Qt Applications (No Starch Press, 2007)
Mollie Makes Presents - Simple Sewing - October 2025
The Money Box / Odd Craft, Part 1.
W. W. Jacobs
The Money Master, Complete
Gilbert Parker
Money-making men; or, how to grow rich
J. Ewing Ritchie
MySQL
Wikibooks
MySQL 9.0 Reference Manual - Including MySQL NDB Cluster 9.0
Natural Language Processing with Python (2009)
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source ...
Archibald
Network Analysis Using Wireshark 2 Cookbook
Network Attacks & Exploitation: A Framework
www.it-ebooks.info
Network Basics for Hackers
Zamzar
Network Security Through Data Analysis
Michael Collins
The Newbie's guide to microgreens
REACT Green
Nmap Essentials
Nmap Network Exploration and Security Auditing Cookbook 2nd ...
Numerical Methods in Engineering with Python (2005)
O'Reilly - Head First Object-Oriented Analysis & Design
Brett McLaughlin & Gary Pollice & David West
O'Reilly - Java Message Service
O'Reilly - Java™ Extreme Programming Cookbook
Brian M. Coyner Eric M. Burke
Object Oriented Programming Languages, Interpretation, 2007
Object-Oriented Software Construction
OCA Java SE 7 Programmer I Certification Guide
OCA Oracle Certified Associate Java SE 8 Programmer I Study ...
Jeane Boyarsky
OCAJP Oracle Certified Associate Java SE 7 Programmer Practice ...
Hanumant Deshmukh
The Odyssey / Rendered into English prose for the use of those ...
Homer
On the Trail of the Space Pirates
Carey Rockwell
One Thousand Ways to Make a Living; or, An Encyclopædia of Plans ...
Harold Morse Dunphy