CEH Certified Ethical Hacker Study Guide
Kimberly Graves
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Understanding Bitcoin: Cryptography, Engineering and Economics
Pedro Franco
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
GNS3 Network Simulation Guide
Rednectar Chris Welsh