Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ec-Council
Nineteen Eighty-Four
George Orwell & Thomas Pynchon
The Selfish Gene: 30th Anniversary Edition
Richard Dawkins