Threat Modeling
Adam Shostack
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
Hacking the Cable Modem
DerEngel
Technical Writing for Business People
Carrie Marshall
Privacy Online
Sabine Trepte & Leonard Reinecke