- eBookVisualization HandbookCharles D. Hansen
- eBookConfiguring VMware ESX Server 2.5Al Muller
- eBookMastering C PointersRobert J. Traister
- eBookThe Basics of Cloud ComputingDerrick Rountree
- eBookFundamentals of Plant VirologyR C Matthews
- eBookThe Basics of Cyber WarfareJason Andress
- eBookPractical Lock PickingDeviant Ollam
- eBookConfiguring NetScreen FirewallsRob Cameron
- eBookTexturing and ModelingElsevier Science
- eBookVirtual Reality SystemsElsevier Science
- eBookThe Basics of Web HackingJosh Pauli
- eBookUTM Security with FortinetKenneth Tam
- eBookViolent PythonTJ O'Connor
- eBookMigrating to the CloudTom Laszewski
- eBookUser Experience in the Age of SustainabilityKem-Laurin Kramer
- eBookWeb Application ObfuscationMario Heiderich
- eBookLogging and Log ManagementKevin Schmidt
- eBookThe Hacker's Guide to OS XAlijohn Ghassemlouei
- eBookData InsightsHunter Whitney
- eBookContent Strategy at WorkMargot Bloomstein
- eBookHacking Web AppsMike Shema
- eBookInformation Security Risk Assessment ToolkitMark Talabis
- eBookPractical Lock PickingDeviant Ollam
- eBookMoving To The CloudGeetha Manjunath
- eBookClient-Side Attacks and DefenseSean-Philip Oriyano
- eBookPenetration Tester's Open Source ToolkitJeremy Faircloth
- eBookNinja HackingThomas Wilhelm
- eBookCollaborative Enterprise ArchitectureStefan Bente
- eBookCyber WarfareJason Andress
- eBookJoe Celko's Trees and Hierarchies in SQL for SmartiesJoe Celko
- eBookCitrix XenDesktop ImplementationGareth R. James
- eBookThe Basics of Information SecurityJason Andress
- eBookWireless Reconnaissance in Penetration TestingMatthew Neely
- eBookLow Tech HackingTerry Gudaitis
- eBookBrave NUI WorldDaniel Wigdor
- eBookDesign for EmotionTrevor van Gorp
- eBookIndustrial Network SecurityEric D. Knapp
- eBookCybercrime and EspionageWill Gragido
- eBookPervasive Information ArchitectureAndrea Resmini
- eBookMicrosoft Windows Server 2008 R2 Administrator's ReferenceDustin Hannifin
- eBookAugmented RealityJoseph Rampolla
- eBookGrounded InnovationLars Erik Holmquist
- eBookThe Basics of Digital ForensicsJohn Sammons
- eBookCoding for Penetration TestersJason Andress
- eBookSecuring SQL ServerDenny Cherry
- eBookManaged Code RootkitsErez Metula
- eBookSecurity for Microsoft Windows System AdministratorsDerrick Rountree
- eBookThe Basics of Hacking and Penetration TestingPatrick Engebretson
- eBookSecurity Risk ManagementEvan Wheeler