Deep Learning Approaches to Text Production
Shashi Narayan and Claire Gardent
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Attacking Network Protocols
James Forshaw
Practical Hardware Pentesting
Jean-Georges Valle
Code Craft
Pete Goodliffe
Computer Architecture
Charles Fox
Computer Graphics from Scratch: A Programmer’s Introduction ...
Gabriel Gambetta
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Jeremy Kubica
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
Effective C
Robert C. Seacord
Graph Algorithms the Fun Way
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
How Computers Really Work: A Hands-On Guide to the Inner Workings ...
Matthew Justice
How Software Works
V. Anton Spraul
Inside the Machine
Jon Stokes
Introduction to Computer Organization
Robert G. Plantz
The Book of I2C
Randall Hyde
The Complete Developer
Martin Krause
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Write Great Code, Volume 1: Understanding the Machine, 2nd Edition
Writing a C Compiler
Nora Sandler
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Linux Basics for Hackers
OccupyTheWeb
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
Serious Cryptography
Jean-Philippe Aumasson
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Practical Packet Analysis 3rd Edition
Chris Sanders
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
The Hardware Hacker
Andrew “bunnie” Huang
The Car Hacker’s Handbook
Craig Smith
AWS Penetration Testing
Jonathan Helmus
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Ghidra Software Reverse Engineering for Beginners
A. P. David
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Mastering Python for Networking and Security
José Manuel Ortega
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
Cyber Minds
Shira Rubinoff
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Learn Computer Forensics
William Oettinger
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Digital Forensics and Incident Response
Gerard Johansen
Learn Kali Linux 2019
Glen D. Singh
Software Architecture Patterns
Mark Richards
Technology Strategy Patterns
Eben Hewitt