Privacy Online
Sabine Trepte & Leonard Reinecke
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Learn Windows PowerShell in a Month of Lunches
Don Jones
Linux Server Security
Chris Binnie
Teach Your Kids to Code
Bryson Payne
Technical Writing for Business People
Carrie Marshall
Think Like a Programmer
V. Anton Spraul
Threat Modeling
Adam Shostack
Thriving in the Community College and Beyond
Joseph B Cuseo & Julie A. McLaughlin & Aaron Thompson & Steady Moono
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Negus, Christopher
Unauthorised Access
Wil Allsopp
Unix Power Tools
Shelley Powers, Jerry Peek, Tim O'Reilly & Mike Loukides
Using and Administering Linux: Volume 1
David Both
The UX Careers Handbook
Cory Lebson
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Vi IMproved--VIM
Steve Oualline
The Web Application Hacker’s Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
White Space Is Not Your Enemy
Kim Golombisky & Rebecca Hagen
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker