Data Analysis with Open Source Tools
Philipp K. Janert
Programming Perl
Tom Christiansen & Brian D Foy & Larry Wall & Jon Orwant
DNS and BIND, 5th Edition
Cricket Liu & Paul Albitz
Git Pocket Guide
Richard E. Silverman
Revolution in the Valley
Andy Hertzfeld
Hackers & Painters
Paul Graham
Head First Java
Kathy Sierra & Bert Bates
head first (3)
Java in a Nutshell
David Flanagan & Benjamin J. Evans
SSH - The Secure Shell (2nd Edition)
Daniel J. Barrett & Richard E. Silverman & Robert G. Byrnes
JavaScript: The Good Parts
Douglas Crockford
97 Things Every Programmer Should Know
Kevlin Henney
Information Architecture: For the Web and Beyond
Louis Rosenfeld & Peter Morville & Jorge Arango
vi and Vim Editors Pocket Reference
Arnold Robbins
The Cathedral & the Bazaar
Eric S. Raymond
Hands-On Red Team Tactics
Himanshu Sharma
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Mastering Linux Security and Hardening
Donald A. Tevault
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Becoming the Hacker
Adrian Pruteanu
Saltstack Documentation - Release 2019.2.1
SaltStack, Inc.
Introducing Regular Expressions
Michael Fitzgerald
Learning GNU Emacs, 3rd Edition
Debra Cameron, & James Elliott & Marc Loy & Eric S. Raymond & Bill Rosenblatt
Learning the bash Shell, 3rd Edition
Cameron Newham
Learning the vi and Vim Editors
Arnold Robbins & Elbert Hannah & Linda Lamb
Linux Device Drivers, 3rd Edition
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux System Programming
Robert Love
Mastering Regular Expressions, Third Edition
Jeffrey E. F. Friedl
sed & awk, 2nd Edition
Dale Dougherty & Arnold Robbins
UNIX Power Tools, 3rd Edition
Jerry Peek, Shelley Powers, Tim O’Reilly & Mike Loukides
bash Cookbook
Carl Albing & JP Vossen
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
grep Pocket Reference
John Bambenek & Agnieszka Klus
Effective awk Programming
RFC 6071 - IP Security (IPsec) and Internet Key Exchange (IKE) ...
S. Frankel & S. Krishnan
rfc (6071)
RFC 4301 - Security Architecture for the Internet Protocol
S. Kent & K. Seo
rfc (4301)
Head First Design Patterns
Eric Freeman & Elisabeth Robson & Bert Bates
head first (1)
Computer Networking: A Top-Down Approach (7th edition)
James Kurose & Keith Ross
Head First Software Development
Dan Pilone & Russ Miles
head first (2)
Compilers: Principles, Techniques & Tools
Alfred V. Aho & Monica S. Lam & Ravi Sethi & Jeffrey D. Ullman
The Diary Of A Young Girl
Anne Frank
Kotlin in Action
Dmitry Jemerov & Svetlana Isakova
The Art of SEO: Mastering Search Engine Optimization
Eric Enge & Stephan Spencer & Jessie C. Stricchiola
Domain-Driven Design - Tackling Complexity in the Heart of Software
Eric Evans
Implementing Domain-Driven Design
Vaughn Vernon
Efficient Algorithms for Sorting and Synchronization (rsync)
Andrew Tridgell
RFC 7540 - Hypertext Transfer Protocol Version 2 (HTTP/2)
M. Belshe & R.Peon & M. Thomson
rfc (7540)
RFC 8441 - Bootstrapping WebSockets with HTTP/2
P. McManus
rfc (8441)
RFC 6455 - The WebSocket Protocol
I. Fette & A. Melnikov
rfc (6455)
RFC 4253 - The Secure Shell (SSH) Transport Layer Protocol
T. Ylonen & C. Lonvick
rfc (4253)
RFC 4122 - A Universally Unique Identifier (UUID) URN Namespace
P. Leach & M. Mealling & R.Salz
rfc (4122)
JWT Handbook
Sebastián E. Peyrott
Artificial Intelligence By Example
Denis Rothman
Deep Learning for Computer Vision
Rajalingappa Shanmugamani
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
Deep Reinforcement Learning Hands-On
Maxim Lapan
Hands-On Artificial Intelligence for IoT
Amita Kapoor
Hands-On Deep Learning for Games
Micheal Lanham
Hands-On Machine Learning for Algorithmic Trading
Stefan Jansen