Identity Attack Vectors
Morey J. Haber & Darran Rolls
Systems Engineering Demystified, Second Edition
Jon Holt
Securing Office 365
Matthew Katzer
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Polished Ruby Programming
Jeremy Evans