By the Blood of Heroes
Joseph Nassise
The Curse of Chalion
Lois McMaster Bujold
Dead Run
Adam Mansbach
Dead Witch Walking
Kim Harrison
Map of Bones
James Rollins
Sandman Slim
Richard Kadrey
The Taken
Vicki Petterson
Boneshaker
Cherie Priest
The Last Unicorn
Peter S. Beagle
Spin
Robert Charles Wilson
Shards of Honor (Vorkosigan Saga)
Little Brother
Cory Doctorow
Just a Geek
Wil Wheaton
Signal to Noise
Neil Gaiman & Dave McKean
Machine of Death: A Collection of Stories About People Who Know ...
Ryan North & Matthew Bennardo & David Malki
The Poison Eaters and Other Stories
Holly Black
Jumper
Steven Gould
The Happiest Days of Our Lives
TITHE: A Modern Faerie Tale
Zombies vs. Unicorns
Holly Black & Justine Larbalestier
CompTIA Security+ Certification Guide
Ian Neil
Web Penetration Testing with Kali Linux - Third Edition
Gilberto Nájera-Gutiérrez
Cybersecurity: Attack and Defense Strategies
Yuri Diogenes
Practical Mobile Forensics - Third Edition
Rohit Tamma
Digital Forensics and Incident Response
Gerard Johansen
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Practical Cyber Intelligence
Wilson Bautista Jr.
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Metasploit for Beginners
Sagar Rahalkar
Network Analysis Using Wireshark 2 Cookbook Second Edition
Nagendra Kumar Nainar
Mastering Kali Linux for Advanced Penetration Testing, Second ...
Vijay Kumar Velu
Mastering pfSense, Second Edition
David Zientara
Learning Malware Analysis
MONNAPPA K A
Industrial Cybersecurity
Pascal Ackerman
Hands-On Penetration Testing on Windows
Phil Bramwell
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
Hands-on Cybersecurity for Architects
Neil Rerup
Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
The Tangled Web
Michal Zalewski
The Car Hacker’s Handbook
Craig Smith
Silence on the Wire
Serious Cryptography
Jean-Philippe Aumasson
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Practical Forensic Imaging
Bruce Nikkel
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
iOS Application Security
David Thiel
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Gray Hat C#
Brandon Perry
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Attacking Network Protocols
James Forshaw
Eloquent Javascript [3rd edition]
Marijn Haverbeke
Advanced Deep Learning with Keras
Rowel Atienza
Unity Artificial Intelligence Programming , Fourth Edition
Davide Aversa
Python Machine Learning Cookbook, Second Edition
Giuseppe Ciaburro
Python Machine Learning By Example
Yuxi (Hayden) Liu
Python Deep Learning Projects
Matthew Lamons
Python Deep Learning
Ivan Vasilev