- eBookIndustrial Network SecurityEric D. Knapp
- eBookElementary Linear Programming with ApplicationsBernard Kolman
- eBookJoe Celko's SQL for SmartiesJoe Celko
- eBookPhishing ExposedLance James
- eBookPervasive Information ArchitectureAndrea Resmini
- eBookThoughts on Interaction DesignJon Kolko
- eBookViolent PythonTJ O'Connor
- eBookHardware HackingJoe Grand
- eBookSecurity Risk ManagementEvan Wheeler
- eBookAn Introduction to Probability and Statistical InferenceGeorge G. Roussas
- eBookNo Tech HackingJohnny Long
- eBookSeven Deadliest USB AttacksBrian Anderson
- eBookMathematica by ExampleMartha L Abell
- eBookThe Basics of Cloud ComputingDerrick Rountree
- eBookSQL Clearly ExplainedJan L. Harrington
- eBookHack Proofing Your Identity In The Information AgeSyngress
- eBookUTM Security with FortinetKenneth Tam
- eBookPractical VoIP SecurityThomas Porter CISSP CCNP CCDA CCS
- eBookConfiguring Juniper Networks NetScreen and SSG FirewallsRob Cameron
- eBookInformation Security Risk Assessment ToolkitMark Talabis
- eBookWireless HackingLee Barken
- eBookGoogle Hacking for Penetration TestersBill Gardner
- eBookVisualization HandbookCharles D. Hansen
- eBookThe Basics of Cyber WarfareJason Andress
- eBookRelational Database Design and ImplementationJan L. Harrington
- eBookThor's Microsoft Security BibleTimothy "Thor" Mullen
- eBookDissecting the HackBrian Baskin
- eBookHacking Web AppsMike Shema
- eBookMetrics and Methods for Security Risk ManagementCarl Young
- eBookVisual Effects in a Digital WorldKaren Goulekas
- eBookHerpetologyLaurie J. Vitt
- eBookPractical Lock PickingDeviant Ollam
- eBookWeb BloopersJeff Johnson
- eBookLogging and Log ManagementKevin Schmidt
- eBookCheckPoint NG VPN 1/Firewall 1Syngress
- eBookUsability EngineeringJakob Nielsen
- eBookThe Basics of Digital ForensicsJohn Sammons
- eBookMicrosoft Forefront Security Administration GuideJesse Varsalone
- eBookProgramming Lego Mindstorms NXTOwen Bishop
- eBookSnort Intrusion Detection 2.0Syngress
- eBookAugmented RealityJoseph Rampolla
- eBookHow to Cheat at IT Project ManagementSusan Snedaker
- eBookAtmosphere-Ocean DynamicsAdrian E. Gill
- eBookTexturing and ModelingElsevier Science
- eBookSeven Deadliest Microsoft AttacksRob Kraus
- eBookData InsightsHunter Whitney
- eBookDesign for EmotionTrevor van Gorp
- eBookGeophysical Field Theory and Method, Part AElsevier Science