Dungeons & Dragons Monster Manual (Core Rulebook, D&D Roleplaying ...
Dungeons & Dragons
The Hardware Hacker
Andrew Bunnie Huang
Quick Start Guide
John Schember
AD&D 5th Edition - Xanathar s Guide to Somethings
Wizards of the Coast
Learning the Vi and Vim Editors
Arnold Robbins & Elbert Hannah
Tasha's Cauldron of Everything (D&D Rules Expansion) (Dungeons ...
Icewind Dale: Rime of the Frostmaiden (D&D Adventure Book) (Dungeons ...
Web Security for Developers
Malcolm McDonald
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
Dungeons & Dragons vs Rick and Morty (D&D Tabletop Roleplaying ...
Dungeons & Dragons & Jim Zub
Eberron: Rising from the Last War (D&D Campaign Setting and ...
Learning CoreDNS
John Belamaric & Cricket Liu
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.
The Linux Command Line, 2nd Edition
William Shotts
Dungeons & Dragons Guildmasters' Guide to Ravnica (D&D/Magic: ...
Docker: Up & Running
Sean P. Kane & Karl Matthias
D&D MORDENKAINEN'S TOME OF FOES
Network Programmability and Automation
Jason Edelman & Scott S. Lowe & Matt Oswalt
Xanathar's Guide to Everything
Bash Cookbook
Carl Albing & JP Vossen
Volo's Guide to Monsters
Dungeons & Dragons Dungeon Master's Guide (Core Rulebook, D&D ...
Dungeons & Dragons Player's Handbook (Core Rulebook, D&D Roleplaying ...
Linux System Programming
Robert Love
Linux in a Nutshell
Ellen Siever & Stephen Figgins & Robert Love & Arnold Robbins
grep Pocket Reference
John Bambenek & Agnieszka Klus
Classic Shell Scripting
Arnold Robbins & Nelson H. F. Beebe
Learning the bash Shell
Cameron Newham
Linux Device Drivers
Jonathan Corbet & Alessandro Rubini & Greg Kroah-Hartman
Effective Awk Programming
Arnold Robbins
Attacking Network Protocols
James Forshaw
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Hacking: The Art of Exploitation
Jon Erickson
Linux Basics for Hackers
OccupyTheWeb
Malware Data Science
Joshua Saxe, Hillary Sanders
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Penetration Testing: A Hands-On Introduction to Hacking
Gorgia Weidman
Practical Binary Analysis
Dennis Andriesse
Practical Malware Analysis
Michael Sikorski and Andrew Honig
Practical Packet Analysis
Chris Sanders
Real-World Bug Hunting
Peter Yaworski
Rootkits and Bootkits
Alex Matrosov, Eugene Radionov, Sergey Bratus
Serious Cryptography
Jean-Philipee Aumasson
The Car Hacker's Handbook
Craig Smith
But how Do it Know?
J. Clark Scott
RefactoingUI
Unknown
Linux Pocket Guide
Daniel J. Barrett
Unix Power Tools
Shelley Powers
AD&D 5th Edition - Xanathar's Enemies and Allies
Dungeon Master's Guild Adepts
AD&D 5th Edition - Explorer's Guide to Wildemount
AD&D 5th Edition - Module - 10 - Stranger Things Starter Set
AD&D 5th Edition - Module - 12 - Essentials Kit
AD&D 5th Edition - Module - 14 - Dungeons & Dragons vs. Rick ...
AD&D 5th Edition - Mythic Odysseys of Theros
AD&D 5th Edition - Wayfinder's Guide to Eberron (v3)
FIST ULTRA EDITION form fillable character sheet v1.1
Claymore
FIST Ultra Edition (Retail Version)