Learning AWS
Aurobindo Sarkar & Amit Shah
Hadoop Cluster Deployment
Danil Zburivsky
The GNU Make Book
John Graham-Cumming
RESTful Web APIs
Leonard Richardson & Mike Amundsen & Sam Ruby
The UNIX Programming Environment
Brian Wilson Kernighan & Rob. Pike
Genetic Programming: On the Programming of Computers by Means ...
John R. Koza
Expert C Programming: Deep C Secrets
Peter van Der Linden
TCP/IP Illustrated: Volume 2 The Implementation
Gary R. Wright & W. Richard Stevens
TCP/IP Ilustrated (2)
TCP/IP Illustrated: Volume 3 TCP for Transactions, HTTP, NNTP, ...
W. Richard Stevens & Gary R. Wright
TCP/IP Ilustrated (3)
Computer Graphics, C Version
Donald Hearn & M. Pauline Baker
The Art of Computer Programming: Fundamental Algorithms
Donald E. Knuth
The Art of Computer Programming (1)
The Art of Computer Programming: Seminumerical Algorithms
The Art of Computer Programming (2)
The Art of Computer Programming: Sorting and Searching
The Art of Computer Programming (3)
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
How Linux Works: What Every Superuser Should Know
Brian Ward
Operating System Concepts 7th Edition
Abraham Silberschatz & Peter B. Galvin & Greg Gagne
Operating System Concepts (3)
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
Network Security: A Practical Approach
Jan L. Harrington
Cryptography in C and C++
Michael Welschenbach
Learning the Bash Shell: Unix Shell Programming
Cameron Newham & Bill Rosenblatt
Apache Security
Ivan Ristic
Time Management for System Administrators
Thomas A. Limoncelli
The Art of SQL
Stephane Faroult & Peter Robson
Regular Expression Pocket Reference: Regular Expressions for ...
Tony Stubblebine
Network Security Assessment: Know Your Network
Chris McNab
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Michael W. Lucas
Intellectual Property and Open Source
van Lindberg
C Programming: A Modern Approach
Kim N. King
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
The Intel Microprocessors (8th Edition)
Barry B. Brey
Operating System Concepts 8th Edition
Operating System Concepts (2)
Python for Unix and Linux System Administration
Noah Gift & Jeremy Jones
The Illustrated Network: How TCP/IP Works in a Modern Network
Walter Goralski
Modsecurity 2.5
Magnus Mischel
Computer Organization and Architecture: Designing for Performance
William Stallings
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ec-Council
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ethical Hacking and Countermeasures: Web Applications and Data ...
Python Pocket Reference: Python in Your Pocket
Mark Lutz
Artificial Intelligence: A Modern Approach
Stuart Jonathan Russell & Peter Norvig
Bash Pocket Reference
Arnold Robbins
PostgreSQL 9.0 High Performance
Gregory Smith
Database System Concepts 6th Edition
Abraham Silberschatz & Henry Korth & S. Sudarshan
The Linux Programming Interface
Michael Kerrisk
CEH Certified Ethical Hacker Study Guide
Kimberly Graves
Effective Perl Programming: Ways to Write Better, More Idiomatic ...
Joseph N. Hall & Joshua A. McAdams & Brian D Foy
Linux Kernel Development
Robert Love
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
UNIX and Linux System Administration Handbook 4th edition
Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley
Continuous Delivery: Reliable Software Releases Through Build, ...
Jez Humble & David Farley
Computer Networks
Andrew S. Tanenbaum & David Wetherall
Joseph N. Hall & Joshua McAdams & Brian D. Foy
JavaScript: The Definitive Guide
David Flanagan
The Art of Computer Programming: Combinational Algorithms, Part ...
The Art of Computer Programming (4)
Apache Maven 3 Cookbook
Srirangan
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
Jenkins: The Definitive Guide
John Ferguson Smart
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Introduction to 64 Bit Intel Assembly Language Programming for ...
Ray Seyfarth
Network Security Essentials: Applications and Standards
TCP/IP Illustrated: Volume 1 The Protocols
Kevin R. Fall & W. Richard Stevens
TCP/IP Ilustrated (1)
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Jenkins Continuous Integration Cookbook
Alan Berg