Elm Creek Quilts: Quilt Projects Inspired by the Elm Creek Quilts ...
Jennifer Chiaverini & Nancy Odom
Higgs: The Invention and Discovery of the 'God Particle'
Jim Baggott
The Iron Lady: Margaret Thatcher, From Grocer's Daughter to ...
John Campbell & David Freeman
Joe Celko's SQL Puzzles & Answers, Second Edition
Joe Celko
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
Building Blockchain Apps
Michael Yuan & Jae Kwon
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Cloud Native Security
Chris Binnie & Rory McCune
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Dear Hacker
Emmanuel Goldstein
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Federated Identity Primer
Derrick Rountree
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
HTML & XHTML: The Definitive Guide
Chuck Musciano
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Learn Windows IIS in a Month of Lunches
Jason Helmick
Linux Journal December 2013
Linux Journal
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Linux Networking Cookbook
Gregory Boyce
Linux Server Security: Hack and Defend
Chris Binnie
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.