Ethical Hacker’s Penetration Testing Guide
Samir Kumar Rakshit
Linux Advanced Routing and Traffic Control HOWTO
Gregory Maxwell & Remco Mook & Martijn Oosterhout & Paul Schroeder & Jasper Spaans & Bert Hubert
Mastering Linux Administration
Alexandru Calcatinge & Julian Balog
Android глазами хакера
Зобнин Е. Е.
Running GUI Applications in Docker
Fraser Adams
Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & Adam Stubblefield
Bash Idioms: Write Powerful, Flexible, Readable Shell Scripts
Carl Albing & J P Vossen
ETHICAL HACKING: A Beginner's Guide to Learn About Ethical Hacking ...
Brendon Alfred
Iptables Tutorial 1.2.2
Oskar Andreasson
Electronics for Beginners
Jonathan Bartlett
Practical Digital Forensics
Richard Boddington
Front Matter
Jessey Bullock
Kubernetes: Up and Running
Brendan Burns & Joe Beda & Kelsey Hightower & Lachlan Evenson
Mastering OpenLDAP
Matt Butcher
Practical Python Security
Dennis Byrne
Command Line Kung Fu: Bash Scripting Tricks, Linux Shell Programming ...
Jason Cannon
Wireless Network Simulation
Henry Zárate Ceballos & Jorge Ernesto Parra Amaris & Hernan Jiménez Jiménez & Diego Alexis Romero Rincón & Oscar Agudelo Rojas & Jorge Eduardo Ortiz Triviño
PHP
Jamie Chan & Lcf Publishing
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary
NetCat for pentesters - Chiragh
Chiragh
Linux Command Line and Shell Scripting Techniques
Vedran Dakic & Jasmin Redzepagic
Effective DevOps
Jennifer Davis & Ryn Daniels
NGINX Cookbook
Derek Dejonghe
sed & awk
Dale Dougherty & Arnold Robbins
Certified Ethical Hacker (CEH) Exam Cram
William Chuck Easttom
Hacking - The art of exploitation
Jon Erickson
Learning Shell Scripting with Zsh
Gastón Festari
SQL Injection Strategies: Practical techniques to secure old ...
Ettore Galluccio & Edoardo Caselli & Gabriele Lombari
Pluggable Authentication Modules
Kenneth Geisshirt
Designing and Implementing Linux Firewalls with QoS Using Netfilter, ...
Lucian Gheorghe
Practical Social Engineering
Joe Gray
How Cybersecurity Really Works
Sam Grubb
GitHub For Dummies
Sarah Guthals & Phil Haack
Cloud Attack Vectors
Morey J. Haber & Brian Chappell & Christopher Hills
Hacking Linux
Phil J Hack
Active Directory глазами хакера
Ralf Hacker
Ubuntu Linux Unleashed 2021 Edition
Matthew Helmke
Wireless Hacking with Kali Linux
Hugo Hoffman
tmux (for Diego Cohen)
Brian P. Hogan
Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Linux Containers and Virtualization
Shashank Mohan Jain
Wireshark Fundamentals
Vinit Jain
Mastering Linux Network Administration
Jay LaCroix
Ethical Hacking
Elijah Lewis
Cyberspace in Peace and War, Second Edition
Martin C. Libicki
Zabbix 5 IT Infrastructure Monitoring Cookbook
Nathan Liefting & Brian van Baekel
C++ Crash Course
Josh Lospinoso
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Michael W Lucas
Absolute FreeBSD
Michael Warren Lucas
Nmap Network Scanning
Gordon Lyon
Mastering Docker - Second Edition
Russ McKendrick & Scott Gallagher
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Bash Scripting
Moaml Mohmmed & Max Beerbohm
Linux Bible (10th edition)
Christopher Negus
Practical Linux Forensics
Bruce Nikkel
Practical System Programming with C: Pragmatic Example Applications ...
Sri Manikanta Palakollu
Bash Guide for Beginners: Everything You Need to Know about ...
Enriqueta Paneczko
Offensive Shellcode from Scratch
Rishalin Pillay
Docker Deep Dive
Nigel Poulton
Cyber Security and Network Security
Sabyasachi Pramanik & Debabrata Samanta & M. Vinay & Abhijit Guha
Linux iptables Pocket Reference
Gregor N. Purdy