Guide To YC
Jason Shen
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Network Attacks and Exploitation
Matthew Monte
JavaScript Succinctly
Cody Lindley
GIS Succinctly
Peter Shaw