Dungeons & Dragons Guildmasters' Guide to Ravnica (D&D/Magic: ...
Dungeons & Dragons
Effective Awk Programming
Arnold Robbins
Network Programmability and Automation
Jason Edelman & Scott S. Lowe & Matt Oswalt
Learning the bash Shell
Cameron Newham
Attacking Network Protocols
James Forshaw
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Hacking: The Art of Exploitation
Jon Erickson
Linux Basics for Hackers
OccupyTheWeb
Malware Data Science
Joshua Saxe, Hillary Sanders
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Penetration Testing: A Hands-On Introduction to Hacking
Gorgia Weidman
Practical Binary Analysis
Dennis Andriesse
Practical Malware Analysis
Michael Sikorski and Andrew Honig
Practical Packet Analysis
Chris Sanders
Real-World Bug Hunting
Peter Yaworski
Rootkits and Bootkits
Alex Matrosov, Eugene Radionov, Sergey Bratus
Serious Cryptography
Jean-Philipee Aumasson
The Car Hacker's Handbook
Craig Smith
But how Do it Know?
J. Clark Scott
Linux Pocket Guide
Daniel J. Barrett
Unix Power Tools
Shelley Powers
Linux Device Drivers
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
grep Pocket Reference
John Bambenek & Agnieszka Klus
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux System Programming
Robert Love
Bash Cookbook
Carl Albing & JP Vossen
Docker: Up & Running
Sean P. Kane & Karl Matthias
The Linux Command Line, 2nd Edition
William Shotts
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.
The Hardware Hacker
Andrew Bunnie Huang
Learning CoreDNS
John Belamaric & Cricket Liu
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
Web Security for Developers
Malcolm McDonald
Learning the Vi and Vim Editors
Arnold Robbins & Elbert Hannah