Source Code Review for Penetration Testers
Introduction to Wireless Pen Testing and Assessment
CyberWar