The Secret History of Mac Gaming
Richard Moss
A Window Into Time
Peter F. Hamilton
Uneasy Alliances
Robert Lynn Asprin
Thieves' World (11)
Forgotten
M.R. Forbes
The Forgotten (1)
Threat Modeling: Designing for Security
Adam Shostack
Cuckoo's Egg
Clifford Stoll
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Metasploit: The Penetration Tester's Guide
David Kennedy