Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
The Tangled Web
Michal Zalewski
The Car Hacker’s Handbook
Craig Smith
Silence on the Wire
Serious Cryptography
Jean-Philippe Aumasson
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Practical Forensic Imaging
Bruce Nikkel
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
iOS Application Security
David Thiel
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Gray Hat C#
Brandon Perry
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Attacking Network Protocols
James Forshaw
Eloquent Javascript [3rd edition]
Marijn Haverbeke
Advanced Deep Learning with Keras
Rowel Atienza
Unity Artificial Intelligence Programming , Fourth Edition
Davide Aversa
Python Machine Learning Cookbook, Second Edition
Giuseppe Ciaburro
Python Machine Learning By Example
Yuxi (Hayden) Liu
Python Deep Learning Projects
Matthew Lamons
Python Deep Learning
Ivan Vasilev
Natural Language Processing with TensorFlow
Thushan Ganegedara
Mastering Machine Learning Algorithms
Giuseppe Bonaccorso
Machine Learning for Mobile
Revathi Gopalakrishnan
Hands-On Transfer Learning with Python
Dipanjan Sarkar
Hands-On Reinforcement Learning with Python
Sudharsan Ravichandiran
Hands-On Machine Learning for Algorithmic Trading
Stefan Jansen
Hands-On Deep Learning for Games
Micheal Lanham
Hands-On Artificial Intelligence for IoT
Amita Kapoor
Deep Reinforcement Learning Hands-On
Maxim Lapan
Deep Learning with TensorFlow - Second Edition
Giancarlo Zaccone & Rezaul Karim
Deep Learning for Computer Vision
Rajalingappa Shanmugamani
Artificial Intelligence By Example
Denis Rothman
JWT Handbook
Sebastián E. Peyrott
RFC 4122 - A Universally Unique Identifier (UUID) URN Namespace
P. Leach & M. Mealling & R.Salz
rfc (4122)
RFC 4253 - The Secure Shell (SSH) Transport Layer Protocol
T. Ylonen & C. Lonvick
rfc (4253)
RFC 6455 - The WebSocket Protocol
I. Fette & A. Melnikov
rfc (6455)
RFC 8441 - Bootstrapping WebSockets with HTTP/2
P. McManus
rfc (8441)
RFC 7540 - Hypertext Transfer Protocol Version 2 (HTTP/2)
M. Belshe & R.Peon & M. Thomson
rfc (7540)
Domain-Driven Design - Tackling Complexity in the Heart of Software
Eric Evans
The Art of SEO: Mastering Search Engine Optimization
Eric Enge & Stephan Spencer & Jessie C. Stricchiola
Kotlin in Action
Dmitry Jemerov & Svetlana Isakova
The Diary Of A Young Girl
Anne Frank
Compilers: Principles, Techniques & Tools
Alfred V. Aho & Monica S. Lam & Ravi Sethi & Jeffrey D. Ullman
Computer Networking: A Top-Down Approach (7th edition)
James Kurose & Keith Ross
Head First Software Development
Dan Pilone & Russ Miles
head first (2)
Head First Design Patterns
Eric Freeman & Elisabeth Robson & Bert Bates
head first (1)
RFC 4301 - Security Architecture for the Internet Protocol
S. Kent & K. Seo
rfc (4301)
RFC 6071 - IP Security (IPsec) and Internet Key Exchange (IKE) ...
S. Frankel & S. Krishnan
rfc (6071)
Effective awk Programming
Arnold Robbins
grep Pocket Reference
John Bambenek & Agnieszka Klus
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
bash Cookbook
Carl Albing & JP Vossen
UNIX Power Tools, 3rd Edition
Jerry Peek, Shelley Powers, Tim O’Reilly & Mike Loukides
sed & awk, 2nd Edition
Dale Dougherty & Arnold Robbins
Mastering Regular Expressions, Third Edition
Jeffrey E. F. Friedl
Linux System Programming
Robert Love
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux Device Drivers, 3rd Edition
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman