- E-bookVisualization HandbookCharles D. Hansen
- E-bookConfiguring VMware ESX Server 2.5Al Muller
- E-bookMastering C PointersRobert J. Traister
- E-bookThe Basics of Cloud ComputingDerrick Rountree
- E-bookFundamentals of Plant VirologyR C Matthews
- E-bookThe Basics of Cyber WarfareJason Andress
- E-bookPractical Lock PickingDeviant Ollam
- E-bookConfiguring NetScreen FirewallsRob Cameron
- E-bookTexturing and ModelingElsevier Science
- E-bookVirtual Reality SystemsElsevier Science
- E-bookThe Basics of Web HackingJosh Pauli
- E-bookUTM Security with FortinetKenneth Tam
- E-bookViolent PythonTJ O'Connor
- E-bookUser Experience in the Age of SustainabilityKem-Laurin Kramer
- E-bookMigrating to the CloudTom Laszewski
- E-bookWeb Application ObfuscationMario Heiderich
- E-bookLogging and Log ManagementKevin Schmidt
- E-bookThe Hacker's Guide to OS XAlijohn Ghassemlouei
- E-bookContent Strategy at WorkMargot Bloomstein
- E-bookHacking Web AppsMike Shema
- E-bookData InsightsHunter Whitney
- E-bookInformation Security Risk Assessment ToolkitMark Talabis
- E-bookPractical Lock PickingDeviant Ollam
- E-bookMoving To The CloudGeetha Manjunath
- E-bookClient-Side Attacks and DefenseSean-Philip Oriyano
- E-bookPenetration Tester's Open Source ToolkitJeremy Faircloth
- E-bookNinja HackingThomas Wilhelm
- E-bookCollaborative Enterprise ArchitectureStefan Bente
- E-bookCyber WarfareJason Andress
- E-bookJoe Celko's Trees and Hierarchies in SQL for SmartiesJoe Celko
- E-bookCitrix XenDesktop ImplementationGareth R. James
- E-bookThe Basics of Information SecurityJason Andress
- E-bookWireless Reconnaissance in Penetration TestingMatthew Neely
- E-bookDesign for EmotionTrevor van Gorp
- E-bookBrave NUI WorldDaniel Wigdor
- E-bookLow Tech HackingTerry Gudaitis
- E-bookIndustrial Network SecurityEric D. Knapp
- E-bookCybercrime and EspionageWill Gragido
- E-bookPervasive Information ArchitectureAndrea Resmini
- E-bookMicrosoft Windows Server 2008 R2 Administrator's ReferenceDustin Hannifin
- E-bookAugmented RealityJoseph Rampolla
- E-bookGrounded InnovationLars Erik Holmquist
- E-bookThe Basics of Digital ForensicsJohn Sammons
- E-bookSecuring SQL ServerDenny Cherry
- E-bookCoding for Penetration TestersJason Andress
- E-bookManaged Code RootkitsErez Metula
- E-bookSecurity for Microsoft Windows System AdministratorsDerrick Rountree
- E-bookThe Basics of Hacking and Penetration TestingPatrick Engebretson
- E-bookSecurity Risk ManagementEvan Wheeler