Threat Modeling
Adam Shostack
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim
Intro to Java Programming, Comprehensive Version
Y. Daniel Liang
Essential System Administration
Æleen Frisch