Industrial Cybersecurity
Pascal Ackerman
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Technology Strategy Patterns
Eben Hewitt
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Data Structures Succinctly
Robert Horvick
Data Structures Succinctly (1)