Volo's Guide to Monsters
Dungeons & Dragons
AD&D 5th Edition - Explorer's Guide to Wildemount
Wizards of the Coast
The Linux Command Line, 2nd Edition
William Shotts
Docker: Up & Running
Sean P. Kane & Karl Matthias
Real-World Bug Hunting
Peter Yaworski
Penetration Testing: A Hands-On Introduction to Hacking
Gorgia Weidman
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
The Car Hacker's Handbook
Craig Smith
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
But how Do it Know?
J. Clark Scott
Practical Packet Analysis
Chris Sanders
Learning the Vi and Vim Editors
Arnold Robbins & Elbert Hannah
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
Effective Awk Programming
Arnold Robbins
Unix Power Tools
Shelley Powers
Linux Basics for Hackers
OccupyTheWeb
Learning the bash Shell
Cameron Newham
Web Security for Developers
Malcolm McDonald
Linux System Programming
Robert Love
Malware Data Science
Joshua Saxe, Hillary Sanders
The Hardware Hacker
Andrew Bunnie Huang
Practical Malware Analysis
Michael Sikorski and Andrew Honig
Attacking Network Protocols
James Forshaw
Hacking: The Art of Exploitation
Jon Erickson
Network Programmability and Automation
Jason Edelman & Scott S. Lowe & Matt Oswalt
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Linux Device Drivers
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Learning CoreDNS
John Belamaric & Cricket Liu
Linux Pocket Guide
Daniel J. Barrett
grep Pocket Reference
John Bambenek & Agnieszka Klus
Serious Cryptography
Jean-Philipee Aumasson
Practical Binary Analysis
Dennis Andriesse
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Rootkits and Bootkits
Alex Matrosov, Eugene Radionov, Sergey Bratus
Bash Cookbook
Carl Albing & JP Vossen