Technology Strategy Patterns
Eben Hewitt
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Polished Ruby Programming
Jeremy Evans
Practical Cyber Intelligence
Wilson Bautista
JavaScript Succinctly
Cody Lindley