The Adventures of Sherlock Holmes
Arthur Conan Doyle
Modern Operating Systems
Andrew S. Tanenbaum & Herbert Bos
Network Security: A Practical Approach
Jan L. Harrington
Return of the Shadow
J. R. R. Tolkien
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov