Threat Modeling
Adam Shostack
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Red Hat Enterprise Linux 7: Desktops and Administration
Richard Petersen
Onyx Storm (The Empyrean Book 3)
Rebecca Yarros
Unauthorised Access
Wil Allsopp
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno