Administrating Solr
Surendra Mohan
Network Security Essentials: Applications and Standards
William Stallings
The Book of Lost Tales, Part 2
J. R. R. Tolkien
The Book of Lost Tales (2)
Potentes, prepotentes e impotentes
Quino
Unix and Linux System Administration Handbook 5th Edition
Evi Nemeth & Garth Snyder & Ben Whaley & Trent Hein