The Power of Six
Pittacus Lore
Lorien Legacies (2)
Children of Dune
Frank Herbert
Dune (3)
Warrior King
Evan Currie
Odyssey One (5)
Needful Things
Stephen King
Threat Modeling: Designing for Security
Adam Shostack
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier