The Silmarillion
J. R. R. Tolkien
RHSA I
Susan Lauber, Philip Sweany , Rudolf Kastl, George Hacker
Red Hat System Administration (1)
El minotauro global
Yanis Varoufakis
PCI Express Technology: Comprehensive Guide to Generations 1.x, ...
Mike Jackson & Ravi Budruk
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Apache Security
Ivan Ristic
Vmware Vcloud Security
Prasenjit Sarkar
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
Network Security Essentials: Applications and Standards