FIST ULTRA EDITION form fillable character sheet v1.1
Claymore
Real-World Bug Hunting
Peter Yaworski
Volo's Guide to Monsters
Dungeons & Dragons
The Hardware Hacker
Andrew Bunnie Huang
AD&D 5th Edition - Explorer's Guide to Wildemount
Wizards of the Coast
AD&D 5th Edition - Module - 10 - Stranger Things Starter Set
AD&D 5th Edition - Module - 12 - Essentials Kit
AD&D 5th Edition - Module - 14 - Dungeons & Dragons vs. Rick ...
AD&D 5th Edition - Mythic Odysseys of Theros
AD&D 5th Edition - Wayfinder's Guide to Eberron (v3)
AD&D 5th Edition - Xanathar s Guide to Somethings
AD&D 5th Edition - Xanathar's Enemies and Allies
Dungeon Master's Guild Adepts
Attacking Network Protocols
James Forshaw
Bash Cookbook
Carl Albing & JP Vossen
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
But how Do it Know?
J. Clark Scott
The Car Hacker's Handbook
Craig Smith
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.
D&D MORDENKAINEN'S TOME OF FOES
Docker: Up & Running
Sean P. Kane & Karl Matthias
Dungeons & Dragons Dungeon Master's Guide (Core Rulebook, D&D ...
Dungeons & Dragons Guildmasters' Guide to Ravnica (D&D/Magic: ...
Dungeons & Dragons Monster Manual (Core Rulebook, D&D Roleplaying ...
Dungeons & Dragons Player's Handbook (Core Rulebook, D&D Roleplaying ...
Dungeons & Dragons vs Rick and Morty (D&D Tabletop Roleplaying ...
Dungeons & Dragons & Jim Zub
Eberron: Rising from the Last War (D&D Campaign Setting and ...
Effective Awk Programming
Arnold Robbins
FIST Ultra Edition (Retail Version)
Foundations of Information Security: A Straightforward Introduction
Jason Andress
grep Pocket Reference
John Bambenek & Agnieszka Klus
Hacking: The Art of Exploitation
Jon Erickson
Icewind Dale: Rime of the Frostmaiden (D&D Adventure Book) (Dungeons ...
Learning CoreDNS
John Belamaric & Cricket Liu
Learning the bash Shell
Cameron Newham
Learning the Vi and Vim Editors
Arnold Robbins & Elbert Hannah
Linux Basics for Hackers
OccupyTheWeb
The Linux Command Line, 2nd Edition
William Shotts
Linux Device Drivers
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Linux Pocket Guide
Daniel J. Barrett
Linux System Programming
Robert Love
Malware Data Science
Joshua Saxe, Hillary Sanders
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Network Programmability and Automation
Jason Edelman & Scott S. Lowe & Matt Oswalt
Penetration Testing: A Hands-On Introduction to Hacking
Gorgia Weidman
Practical Binary Analysis
Dennis Andriesse
Practical Malware Analysis
Michael Sikorski and Andrew Honig
Practical Packet Analysis
Chris Sanders
Quick Start Guide
John Schember
RefactoingUI
Unknown
Rootkits and Bootkits
Alex Matrosov, Eugene Radionov, Sergey Bratus
Serious Cryptography
Jean-Philipee Aumasson
Tasha's Cauldron of Everything (D&D Rules Expansion) (Dungeons ...
Unix Power Tools
Shelley Powers
Web Security for Developers
Malcolm McDonald
Xanathar's Guide to Everything