40 Algorithms Every Programmer Should Know
Imran Ahmad
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Communication Patterns
Jacqui Read
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Metasploit for Beginners
Sagar Rahalkar
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill