- E-bookIndustrial Network SecurityEric D. Knapp
- E-bookSQL Clearly ExplainedJan L. Harrington
- E-bookLow Tech HackingTerry Gudaitis
- E-bookSnort Intrusion Detection and Prevention ToolkitBrian Caswell
- E-bookNo Tech HackingJohnny Long
- E-bookSSCP Systems Security Certified Practitioner Study Guide and DVD Training SystemSyngress
- E-bookEcology in AgricultureElsevier Science
- E-bookAnalyzing Social Media Networks with NodeXLDerek Hansen
- E-bookLinux Networking Clearly ExplainedBryan Pfaffenberger
- E-bookThe Basics of Cyber WarfareJason Andress
- E-bookWireless Reconnaissance in Penetration TestingMatthew Neely
- E-bookData InsightsHunter Whitney
- E-bookThe Basics of Information SecurityJason Andress
- E-bookEleventh Hour Security+Ido Dubrawsky
- E-bookThe Basics of Web HackingJosh Pauli
- E-bookInformation Security Risk Assessment ToolkitMark Talabis
- E-bookThe Basics of Digital ForensicsJohn Sammons
- E-bookElementary Linear Programming with ApplicationsBernard Kolman
- E-bookJoe Celko's SQL for SmartiesJoe Celko
- E-bookHacking Web AppsMike Shema
- E-bookPhishing ExposedLance James
- E-bookPervasive Information ArchitectureAndrea Resmini
- E-bookCyber WarfareJason Andress
- E-bookThoughts on Interaction DesignJon Kolko
- E-bookAn Introduction to Probability and Statistical InferenceGeorge G. Roussas
- E-bookPractical Lock PickingDeviant Ollam
- E-bookViolent PythonTJ O'Connor
- E-bookSecurity Risk ManagementEvan Wheeler
- E-bookHardware HackingJoe Grand
- E-bookRelational Database Design and ImplementationJan L. Harrington
- E-bookConfiguring Juniper Networks NetScreen and SSG FirewallsRob Cameron
- E-bookPractical VoIP SecurityThomas Porter CISSP CCNP CCDA CCS
- E-bookMathematica by ExampleMartha L Abell
- E-bookSeven Deadliest USB AttacksBrian Anderson
- E-bookWireless HackingLee Barken
- E-bookHack Proofing Your Identity In The Information AgeSyngress
- E-bookGoogle Hacking for Penetration TestersBill Gardner
- E-bookVisualization HandbookCharles D. Hansen
- E-bookThe Basics of Cloud ComputingDerrick Rountree
- E-bookUTM Security with FortinetKenneth Tam
- E-bookManaging and Securing a Cisco Structured Wireless-Aware NetworkDavid Wall
- E-bookThe Mezonic AgendaHerbert Thomson
- E-bookAtmosphere-Ocean DynamicsAdrian E. Gill
- E-bookSeven Deadliest Unified Communications AttacksDan York
- E-bookVideo DemystifiedKeith Jack
- E-bookDesign for EmotionTrevor van Gorp
- E-bookLogging and Log ManagementKevin Schmidt
- E-bookMolecular EpidemiologyElsevier Science
- E-bookCYA Securing IIS 6.0Chris Peiris