GNU Linear Programming Kit: Reference Manual
Essentials of Adobe Flash
Manoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technology
Hallvar Helleseth- Wi-Fi Security: How to Break and Exploit
F-Secure Linux Security
Greg Morrisett- The Engineering Challenges of Trustworthy Computing
Joanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?
Graham Williams- Debian GNU/Linux: Desktop Survival Guide
John Heasman- Firmware Rootkits: The Threat to the Enterprise
Jem Berkes- Topics in Network Security
Andreas Bunten- UNIX and Linux based Kernel Rootkits
Alexander Kornbrust- Oracle Rootkits 2.0
Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
Ray Toal- Ajax Programming
Simon Josefsson- GNU Generic Security Service Library
Programming with GNU Software
Wolf Zimmermann- On the Correctness of Transformations in Compiler Back-Ends
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirt: Implementing malware with virtual machines
WangYao- Rootkit on Linux x86
Douglas P. Medley- Virtualization Technology Applied to Rootkit Defense