The Hardware Hacker
Andrew Bunnie Huang
grep Pocket Reference
John Bambenek
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Threat Modeling
Adam Shostack
Introduction to Sociology 2e
Heather Griffiths & Nathan Keirns & Gail Scaramuzzo & Susan Cody-Rydzewski & Eric Strayer & Sally Vyrain