- Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
- Constitutional Law: Cases in Context, Vol. II: Civil Rights and Civil Liberties (Constitutional Law)
- Writing Security Tools and Exploits
- Bong Hits 4 Jesus: A Perfect Constitutional Storm in Alaska's Capital
- Buffer Overflow Attacks