The Developing Person Through the Life Span
Kathleen Berger
Threat Modeling
Adam Shostack
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Red Hat Enterprise Linux 6 Administration
Sander van Vugt
Introduction to Java Programming and Data Structures
Comprehensive Version
Intro to Java Programming, Comprehensive Version
Y. Daniel Liang
Basics of Web Design: HTML5 & CSS (5th Edition)
Terry Felke-Morris