- E-bookStealing the NetworkRyan Russell
- E-bookEleventh Hour Security+Ido Dubrawsky
- E-bookClient-Side Attacks and DefenseSean-Philip Oriyano
- E-bookWireless HackingLee Barken
- E-bookHardware HackingJoe Grand
- E-bookCompTIA Linux+ Certification Study Guide (2009 Exam)Chris Happel
- E-bookLow Tech HackingTerry Gudaitis
- E-bookPhishing ExposedLance James
- E-bookThe Best Damn Cisco Internetworking Book PeriodSyngress
- E-bookIndustrial Network SecurityEric D. Knapp
- E-bookNo Tech HackingJohnny Long
- E-bookWireless Reconnaissance in Penetration TestingMatthew Neely
- E-bookThe Basics of Web HackingJosh Pauli
- E-bookNetwork+ Study Guide & Practice ExamsRobert Shimonski
- E-bookPractical Lock PickingDeviant Ollam
- E-bookCISSP Study GuideJoshua Feldman
- E-bookSnort Intrusion Detection and Prevention ToolkitBrian Caswell
- E-bookHacking Web AppsMike Shema
- E-bookSeven Deadliest USB AttacksBrian Anderson
- E-bookSSCP Systems Security Certified Practitioner Study Guide and DVD Training SystemSyngress
- E-bookThe Basics of Information SecurityJason Andress
- E-bookThe Basics of Cyber WarfareJason Andress
- E-bookCyber WarfareJason Andress
- E-bookPractical Lock PickingDeviant Ollam
- E-bookViolent PythonTJ O'Connor
- E-bookThe Basics of Digital ForensicsJohn Sammons
- E-bookInformation Security Risk Assessment ToolkitMark Talabis
- E-bookSecurity Risk ManagementEvan Wheeler
- E-bookCybercrime and EspionageWill Gragido
- E-bookSeven Deadliest Microsoft AttacksRob Kraus
- E-bookSéries: How to CheatAnthony Piltzecker
- E-bookManaging Cisco Network SecuritySyngress
- E-bookHackproofing Your Wireless NetworkSyngress
- E-bookGoogle Hacking for Penetration TestersBill Gardner
- E-bookMicrosoft VirtualizationThomas Olzak
- E-bookCYA Securing IIS 6.0Chris Peiris
- E-bookHack Proofing XMLSyngress
- E-bookMCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)Syngress
- E-bookThe Real MCTS/MCITP Exam 70-620 Prep KitAnthony Piltzecker
- E-bookConfiguring VMware ESX Server 2.5Al Muller
- E-bookMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability ResearchDavid Maynor
- E-bookIT Ethics Handbook:Stephen Northcutt
- E-bookApple I Replica CreationTom Owad
- E-bookDr. Tom Shinder's Configuring ISA Server 2004Debra Littlejohn Shinder
- E-bookCisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation KitDale Liu
- E-bookNetwork Security Evaluation Using the NSA IEMRuss Rogers
- E-bookThe Basics of Cloud ComputingDerrick Rountree
- E-bookThe Real MCTS/MCITP Exam 70-640 Prep KitAnthony Piltzecker
- E-bookHack Proofing LinuxJames Stanger