Fugitive Six
Pittacus Lore
Lorien Legacies Reborn (2)
Foundation and Chaos
Greg Bear
Second Foundation Trilogy (2)
Play Between Worlds
Scott
Stealers' Sky
Robert Lynn Asprin
Thieves' World (12)
Threat Modeling: Designing for Security
Adam Shostack
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Applied Cryptography: Protocols, Algorithms and Source Code ...