Return of the Shadow
J. R. R. Tolkien
Windows Internals: User Mode
Mark E. Russinovich & Alex Ionescu & Brian Catlin & Jamie Hanrahan & David A. Solomon
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
Modsecurity 2.5
Magnus Mischel
DevEx as a Service
Matthew Casperson
Learn Windows PowerShell in a Month of Lunches
Don Jones & Jeffery Hicks & Jeffrey T. Hicks
RT Essentials
Richard Foley
WildFly Configuration, Deployment, and Administration - Second ...
Christopher Ritchie
Learning AWS
Aurobindo Sarkar & Amit Shah
Jenkins Essentials
Mitesh Soni
Mastering Apache Spark
Mike Frampton
Web Security: A WhiteHat Perspective
Hanqing Wu & Liz Zhao
Marijuana Grower's Handbook: Your Complete Guide for Medical ...
Ed Rosenthal & Tommy Chong
Networking the Complete Reference, Third Edition
Bobbi Sandberg
Mastering Apache Maven 3
Prabath Siriwardena
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
Java: The Complete Reference, Ninth Edition
Herbert Schildt
Star Trek Federation: The First 150 Years
David A. Goodman
Extreme Metal: Music and Culture on the Edge
Keith Kahn-Harris
God Created the Integers: The Mathematical Breakthroughs That ...
Stephen Hawking
Genetic Programming: On the Programming of Computers by Means ...
John R. Koza
Information Doesn't Want to Be Free: Laws for the Internet Age
Cory Doctorow & Amanda Palmer & Neil Gaiman
HTML5 Pocket Reference
Jennifer Niederst Robbins
The Motorcycle Diaries: Notes on a Latin American Journey
Ernesto Che Guevara