Effective Programming
Jeff Atwood
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Hands-On Differential Privacy
Ethan Cowan & Mayana Pereira & and Michael Shoemate
Technical Program Manager’s Handbook
Joshua Alan Teter
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Kali Linux Web Penetration Testing Cookbook, Second Edition
Gilberto Najera-Gutierrez
Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
Metasploit for Beginners
Sagar Rahalkar
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts