SSH - The Secure Shell (2nd Edition)
Daniel J. Barrett & Richard E. Silverman & Robert G. Byrnes
Head First Java
Kathy Sierra & Bert Bates
head first (3)
Java Threads, 3rd Edition
Scott Oaks & Henry Wong
C++ Pocket Reference
Kyle Loudon
Regular Expression Pocket Reference
Tony Stubblebine
C Pocket Reference
Peter Prinz & Ulla Kirch-Prinz
The Intelligent Investor, Rev. Ed
Benjamin Graham
Just a Geek
Wil Wheaton
UNIX Power Tools, 3rd Edition
Jerry Peek, Shelley Powers, Tim O’Reilly & Mike Loukides
Linux Device Drivers, 3rd Edition
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Learning the bash Shell, 3rd Edition
Cameron Newham
Learning GNU Emacs, 3rd Edition
Debra Cameron, & James Elliott & Marc Loy & Eric S. Raymond & Bill Rosenblatt
DNS and BIND, 5th Edition
Cricket Liu & Paul Albitz
Maven: The Definitive Guide
Sonatype Company
sed & awk Pocket Reference
Arnold Robbins
grep Pocket Reference
John Bambenek & Agnieszka Klus
Milky Way Railroad
Kenji Miyazawa
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
JavaScript: The Good Parts
Douglas Crockford
Real World Haskell
Bryan O’Sullivan & John Goerzen & Donald Bruce Stewart
Little Brother
Cory Doctorow
The Cathedral & the Bazaar
Eric S. Raymond
Hackers & Painters
Paul Graham
Learning the vi and Vim Editors
Arnold Robbins & Elbert Hannah & Linda Lamb
Seventy-nine Short Essays on Design
Michael Bierut
Mastering Regular Expressions, Third Edition
Jeffrey E. F. Friedl
Revolution in the Valley
Andy Hertzfeld
Spin
Robert Charles Wilson
Silence on the Wire
Michal Zalewski
Twinmaker
Sean Williams
The Wasteland Saga
Nick Cole
The Witch of Portobello
Paulo Coelho
American Gods
Neil Gaiman
Busting Vega$
Ben Mezrich
The Curse of Chalion
Lois McMaster Bujold
Dead Witch Walking
Kim Harrison
Map of Bones
James Rollins
Sandman Slim
Richard Kadrey
Eloquent Javascript [3rd edition]
Marijn Haverbeke
Natural Language Processing with TensorFlow
Thushan Ganegedara
Deep Reinforcement Learning Hands-On
Maxim Lapan
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
JWT Handbook
Sebastián E. Peyrott
Quick Start Guide
John Schember
C# in Depth, Fourth Edition
Jon Skeet
A Marine on Trial
John Woodrow Cox
Looking for America: A journey into the country's dividied heart
David Maraniss & Robert Samuels
Brain Hacking
Amy Ellis Nutt
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Firewalls Don't Stop Dragons
Carey Parker
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon