Dungeons & Dragons Monster Manual (Core Rulebook, D&D Roleplaying ...
Dungeons & Dragons
Learning the Vi and Vim Editors
Arnold Robbins & Elbert Hannah
The Car Hacker's Handbook
Craig Smith
Tasha's Cauldron of Everything (D&D Rules Expansion) (Dungeons ...
Attacking Network Protocols
James Forshaw
Bash Cookbook
Carl Albing & JP Vossen
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
But how Do it Know?
J. Clark Scott
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.
Docker: Up & Running
Sean P. Kane & Karl Matthias
Effective Awk Programming
Arnold Robbins
Foundations of Information Security: A Straightforward Introduction
Jason Andress
grep Pocket Reference
John Bambenek & Agnieszka Klus
Hacking: The Art of Exploitation
Jon Erickson
The Hardware Hacker
Andrew Bunnie Huang
Learning CoreDNS
John Belamaric & Cricket Liu
Learning the bash Shell
Cameron Newham
Linux Basics for Hackers
OccupyTheWeb
The Linux Command Line, 2nd Edition
William Shotts
Linux Device Drivers
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux Pocket Guide
Daniel J. Barrett
Linux System Programming
Robert Love
Malware Data Science
Joshua Saxe, Hillary Sanders
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Network Programmability and Automation
Jason Edelman & Scott S. Lowe & Matt Oswalt
Penetration Testing: A Hands-On Introduction to Hacking
Gorgia Weidman
Practical Binary Analysis
Dennis Andriesse
Practical Malware Analysis
Michael Sikorski and Andrew Honig
Practical Packet Analysis
Chris Sanders
Real-World Bug Hunting
Peter Yaworski
Rootkits and Bootkits
Alex Matrosov, Eugene Radionov, Sergey Bratus
Serious Cryptography
Jean-Philipee Aumasson
Unix Power Tools
Shelley Powers
Web Security for Developers
Malcolm McDonald