CSCI-4150 Introdcution to Artifical Intelligence
Unknown
Windows Forensics Analysis
Beginning Hibernate, 2006
Nmap Network Exploration and Security Auditing Cookbook 2nd ...
grep Pocket Reference
John Bambenek & Agnieszka Klus