Threat Modeling
Adam Shostack
Let's Go!
Alex Edwards
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Metasploit for Beginners
Sagar Rahalkar
Introduction to Sociology 2e
Heather Griffiths & Nathan Keirns & Gail Scaramuzzo & Susan Cody-Rydzewski & Eric Strayer & Sally Vyrain