The Car Hacker's Handbook
Craig Smith
Dungeons & Dragons vs Rick and Morty (D&D Tabletop Roleplaying ...
Dungeons & Dragons & Jim Zub
Dungeons & Dragons Player's Handbook (Core Rulebook, D&D Roleplaying ...
Dungeons & Dragons
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.
AD&D 5th Edition - Xanathar's Enemies and Allies
Dungeon Master's Guild Adepts
Bash Cookbook
Carl Albing & JP Vossen
Rootkits and Bootkits
Alex Matrosov, Eugene Radionov, Sergey Bratus
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Practical Binary Analysis
Dennis Andriesse
Serious Cryptography
Jean-Philipee Aumasson
grep Pocket Reference
John Bambenek & Agnieszka Klus
Linux Pocket Guide
Daniel J. Barrett
Learning CoreDNS
John Belamaric & Cricket Liu
FIST ULTRA EDITION form fillable character sheet v1.1
Claymore
FIST Ultra Edition (Retail Version)
AD&D 5th Edition - Explorer's Guide to Wildemount
Wizards of the Coast
AD&D 5th Edition - Module - 10 - Stranger Things Starter Set
AD&D 5th Edition - Module - 12 - Essentials Kit
AD&D 5th Edition - Module - 14 - Dungeons & Dragons vs. Rick ...
D&D MORDENKAINEN'S TOME OF FOES
AD&D 5th Edition - Mythic Odysseys of Theros
AD&D 5th Edition - Wayfinder's Guide to Eberron (v3)
AD&D 5th Edition - Xanathar s Guide to Somethings
Linux Device Drivers
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Dungeons & Dragons Dungeon Master's Guide (Core Rulebook, D&D ...
Eberron: Rising from the Last War (D&D Campaign Setting and ...
Dungeons & Dragons Guildmasters' Guide to Ravnica (D&D/Magic: ...
Icewind Dale: Rime of the Frostmaiden (D&D Adventure Book) (Dungeons ...
Dungeons & Dragons Monster Manual (Core Rulebook, D&D Roleplaying ...
Tasha's Cauldron of Everything (D&D Rules Expansion) (Dungeons ...
Volo's Guide to Monsters
Xanathar's Guide to Everything
Network Programmability and Automation
Jason Edelman & Scott S. Lowe & Matt Oswalt
Hacking: The Art of Exploitation
Jon Erickson
Attacking Network Protocols
James Forshaw
Practical Malware Analysis
Michael Sikorski and Andrew Honig
The Hardware Hacker
Andrew Bunnie Huang
Malware Data Science
Joshua Saxe, Hillary Sanders
Docker: Up & Running
Sean P. Kane & Karl Matthias
Linux System Programming
Robert Love
Web Security for Developers
Malcolm McDonald
Learning the bash Shell
Cameron Newham
Linux Basics for Hackers
OccupyTheWeb
Unix Power Tools
Shelley Powers
Effective Awk Programming
Arnold Robbins
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
Learning the Vi and Vim Editors
Arnold Robbins & Elbert Hannah
Practical Packet Analysis
Chris Sanders
Quick Start Guide
John Schember
But how Do it Know?
J. Clark Scott
The Linux Command Line, 2nd Edition
William Shotts
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
RefactoingUI
Unknown
Penetration Testing: A Hands-On Introduction to Hacking
Gorgia Weidman
Real-World Bug Hunting
Peter Yaworski