- eBookLow Tech HackingTerry Gudaitis
- eBookIndustrial Network SecurityEric D. Knapp
- eBookLinux Networking Clearly ExplainedBryan Pfaffenberger
- eBookWireless Reconnaissance in Penetration TestingMatthew Neely
- eBookData InsightsHunter Whitney
- eBookThe Basics of Web HackingJosh Pauli
- eBookThe Basics of Information SecurityJason Andress
- eBookEleventh Hour Security+Ido Dubrawsky
- eBookThe Basics of Cyber WarfareJason Andress
- eBookInformation Security Risk Assessment ToolkitMark Talabis
- eBookThe Basics of Digital ForensicsJohn Sammons
- eBookHacking Web AppsMike Shema
- eBookSnort Intrusion Detection and Prevention ToolkitBrian Caswell
- eBookCyber WarfareJason Andress
- eBookPractical Lock PickingDeviant Ollam
- eBookJoe Celko's SQL for SmartiesJoe Celko
- eBookElementary Linear Programming with ApplicationsBernard Kolman
- eBookNo Tech HackingJohnny Long
- eBookSeven Deadliest USB AttacksBrian Anderson
- eBookPhishing ExposedLance James
- eBookMathematica by ExampleMartha L Abell
- eBookPervasive Information ArchitectureAndrea Resmini
- eBookVisualization HandbookCharles D. Hansen
- eBookThoughts on Interaction DesignJon Kolko
- eBookThe Basics of Cloud ComputingDerrick Rountree
- eBookAn Introduction to Probability and Statistical InferenceGeorge G. Roussas
- eBookViolent PythonTJ O'Connor
- eBookSecurity Risk ManagementEvan Wheeler
- eBookHardware HackingJoe Grand
- eBookSQL Clearly ExplainedJan L. Harrington
- eBookUTM Security with FortinetKenneth Tam
- eBookRelational Database Design and ImplementationJan L. Harrington
- eBookConfiguring Juniper Networks NetScreen and SSG FirewallsRob Cameron
- eBookPractical VoIP SecurityThomas Porter CISSP CCNP CCDA CCS
- eBookDissecting the HackBrian Baskin
- eBookHack Proofing Your Identity In The Information AgeSyngress
- eBookWireless HackingLee Barken
- eBookHerpetologyLaurie J. Vitt
- eBookGoogle Hacking for Penetration TestersBill Gardner
- eBookXML Net Developers GuideSyngress
- eBookBlondie24David B. Fogel
- eBookPlant EnergeticsOctavian S. Ksenzhek
- eBookPaleomagnetismMichael W. McElhinny
- eBookAnnotated C# StandardJon Jagger
- eBookHackproofing Your Wireless NetworkSyngress
- eBookConfiguring Windows 2000 without Active DirectorySyngress
- eBookModeling Axisymmetric FlowsStanley Middleman
- eBookThe Craft of Information VisualizationElsevier Science
- eBookHow to Cheat at Managing Microsoft Operations Manager 2005Anthony Piltzecker