Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
TCP/IP Illustrated: Volume 2 The Implementation
W. Richard Stevens & Gary R. Wright
TCP/IP Ilustrated (2)
The Meat Lover's Meatless Cookbook: Vegetarian Recipes Carnivores ...
Kim O'Donnel
Punk Rock: So What?: The Cultural Legacy of Punk
Roger Sabin