The Art of Writing Efficient Programs
Fedor G. Pikus
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Policy as Code
Jimmy Ray
Metasploit for Beginners
Sagar Rahalkar
Data Structures Succinctly Part 2
Unknown
Data Structures Succinctly (2)
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)