| 3.13 | - | |
| 3.59 | - | |
| 2.59 | - | |
| 3.76 | - | |
| 4.34 | - | |
Mayflower: The Voyage From Hell | 4 | - | |
| 3.76 | 5.0 | |
| 3 | - | |
 Dam Busters Dam Busters: The Race to Smash the Dams, 1943 | 0 | 5.0 | |
Metasploit: The Penetration Tester's Guide - David Kennedy
- Jim O'Gorman
- Devon Kearns
- Mati Aharoni
| 5 | - | |
Teach yourself visually Windows 7 | 0 | - | |
Ubuntu Hacks - Jonathan Oxer
- Kyle Rankin
- Bill Childers
| 0 | - | |
Understanding ECMAScript 6 | 0 | - | |
Ubuntu Linux toolbox - Christopher Negus
- François Caen
| 0 | - | |
Linux Multimedia Hacks: Tips & Tools for Taming Images, Audio, and Video | 0 | - | |
Digital SLR photography all-in-one for dummies | 0 | - | |
| 2 | - | |
3rd Degree - Andrew Gross
- James Patterson
| 3.9 | - | |
| 0 | - | |
Hacking ExposedTM Web 2.0 | 0 | - | |
Reversing: Secrets of Reverse Engineering | 4 | - | |
Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 4.5 | - | |
| 2 | - | |
The Tangled Web: A Guide to Securing Modern Web Applications | 3.33 | - | |
| 3.68 | - | |
CompTIA Linux+ Complete Study Guide | 0 | - | |
2nd Chance - James Patterson
- Andrew Gross
| 3.83 | - | |
| 5 | - | |
Practical Vim: Edit Text at the Speed of Thought | 4.38 | - | |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 3.31 | - | |
Penetration Testing: A Hands-On Introduction to Hacking | 3 | - | |
| 0 | - | |
Getting Started with Raspberry Pi - Matt Richardson
- Shawn Wallace
| 3.5 | - | |
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing | 0 | - | |
| 0 | - | |
Wicked Cool Shell Scripts | 0 | - | |
| 2 | - | |
| 4.09 | - | |
| 3.98 | - | |
| 0 | 5.0 | |