- eBookStealing the NetworkRyan Russell
- eBookEleventh Hour Security+Ido Dubrawsky
- eBookClient-Side Attacks and DefenseSean-Philip Oriyano
- eBookWireless HackingLee Barken
- eBookHardware HackingJoe Grand
- eBookCompTIA Linux+ Certification Study Guide (2009 Exam)Chris Happel
- eBookLow Tech HackingTerry Gudaitis
- eBookPhishing ExposedLance James
- eBookThe Best Damn Cisco Internetworking Book PeriodSyngress
- eBookIndustrial Network SecurityEric D. Knapp
- eBookNo Tech HackingJohnny Long
- eBookWireless Reconnaissance in Penetration TestingMatthew Neely
- eBookThe Basics of Web HackingJosh Pauli
- eBookNetwork+ Study Guide & Practice ExamsRobert Shimonski
- eBookPractical Lock PickingDeviant Ollam
- eBookCISSP Study GuideJoshua Feldman
- eBookSnort Intrusion Detection and Prevention ToolkitBrian Caswell
- eBookHacking Web AppsMike Shema
- eBookSeven Deadliest USB AttacksBrian Anderson
- eBookSSCP Systems Security Certified Practitioner Study Guide and DVD Training SystemSyngress
- eBookThe Basics of Information SecurityJason Andress
- eBookThe Basics of Cyber WarfareJason Andress
- eBookCyber WarfareJason Andress
- eBookPractical Lock PickingDeviant Ollam
- eBookViolent PythonTJ O'Connor
- eBookThe Basics of Digital ForensicsJohn Sammons
- eBookInformation Security Risk Assessment ToolkitMark Talabis
- eBookSecurity Risk ManagementEvan Wheeler
- eBookCybercrime and EspionageWill Gragido
- eBookSeven Deadliest Microsoft AttacksRob Kraus
- eBookSeri: How to CheatAnthony Piltzecker
- eBookManaging Cisco Network SecuritySyngress
- eBookHackproofing Your Wireless NetworkSyngress
- eBookGoogle Hacking for Penetration TestersBill Gardner
- eBookMicrosoft VirtualizationThomas Olzak
- eBookCYA Securing IIS 6.0Chris Peiris
- eBookHack Proofing XMLSyngress
- eBookMCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)Syngress
- eBookThe Real MCTS/MCITP Exam 70-620 Prep KitAnthony Piltzecker
- eBookConfiguring VMware ESX Server 2.5Al Muller
- eBookMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability ResearchDavid Maynor
- eBookIT Ethics Handbook:Stephen Northcutt
- eBookApple I Replica CreationTom Owad
- eBookDr. Tom Shinder's Configuring ISA Server 2004Debra Littlejohn Shinder
- eBookCisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation KitDale Liu
- eBookNetwork Security Evaluation Using the NSA IEMRuss Rogers
- eBookThe Basics of Cloud ComputingDerrick Rountree
- eBookThe Real MCTS/MCITP Exam 70-640 Prep KitAnthony Piltzecker
- eBookHack Proofing LinuxJames Stanger