CyberBooks

Absolute OpenBSD_ UNIX for the - Michael W. Lucas_1.pdf

A-Defense-of-Poetry.pdf

Android Security Internals_ An - Nikolay Elenkov_2.pdf

Ansible_ From Beginner to Pro - Michael Heap_16.pdf

Applied Cryptography_ Protocol - Bruce Schneier_17.pdf

Beginning Ubuntu for Windows a - Nathan Haines_20.pdf

CEH V9_ Certified Ethical Hack - Sean-Philip Oriyano_21.pdf

Certified OpenStack Administra - Andrey Markelov_22.pdf

Cryptography Engineering_ Desi - Niels Ferguson & Bruce Schneie_23.pdf

Game Hacking_ Developing Auton - Nick Cano_5.pdf

Hacking_ The Art of Exploitati - Jon Erickson_6.pdf

Introducing Ethereum and Solid - Chris Dannen_24.pdf

Introducing Linux Distros - Jose Dieguez Castro_25.pdf

intro-linux.pdf

iOS Application Security - David Thiel_15.pdf

Malware Analyst's Cookbook and - Michael Ligh & Steven Adair_26.pdf

Metasploit_ The Penetration Te - David Kennedy & Devon Kearns_7.pdf

Nginx HTTP Server - Third Edit - Clement Nedelcu_27.pdf

Penetration Testing_ A Hands-O - Georgia Weidman_8.pdf

PoC or GTFO - Manul Laphroaig_9.pdf

Practical Forensic Imaging_ Se - Bruce Nikkel_10.pdf

Practical Linux Topics - Chris Binnie_28.pdf

Practical LPIC-1 Linux Certifi - David Clinton_29.pdf

Practical Packet Analysis, 3E_ - Chris Sanders_11.pdf

Pro Docker - Deepak Vohra_30.pdf

Pro Git - Scott Chacon_31.pdf

Pro Linux High Availability Cl - Sander van Vugt_32.pdf

Pro Vim - Mark McDonnell_33.pdf

Secrets and Lies_ Digital Secu - Bruce Schneier_34.pdf

Security Engineering_ A Guide - Ross J. Anderson_35.pdf

Social Engineering_ The Art of - Christopher Hadnagy_36.pdf

The Art of Deception_ Controll - Kevin D. Mitnick & William L. _18.pdf

The Art of Memory Forensics_ D - Michael Hale Ligh_19.pdf

The Book of PF, 3rd Edition_ A - Peter N. M. Hansteen_3.pdf

The Car Hacker's Handbook_ A G - Craig Smith_4.pdf

The Practice of Network Securi - Richard Bejtlich_12.pdf

The Smart Girl's Guide to Priv - Violet Blue_13.pdf

The Web Application Hacker's H - Dafydd Stuttard & Marcus Pinto_39.pdf

Threat Modeling_ Designing for - Adam Shostack_37.pdf

Unauthorised Access_ Physical - Wil Allsopp_38.pdf

untitled - Chris Eagle_14.pdf