The Economics of Enough: How to Run the Economy as if the Future ...
Diane Coyle
America, But Better
Chris Cannon
Rain on the Dead
Jack Higgins
Sean Dillon (21)
The Reckoning
Len Levinson
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
Building Blockchain Apps
Michael Yuan & Jae Kwon
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Cloud Native Security
Chris Binnie & Rory McCune
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Dear Hacker
Emmanuel Goldstein
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Federated Identity Primer
Derrick Rountree
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
HTML & XHTML: The Definitive Guide
Chuck Musciano
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Learn Windows IIS in a Month of Lunches
Jason Helmick
Linux Journal December 2013
Linux Journal
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Linux Networking Cookbook
Gregory Boyce
Linux Server Security: Hack and Defend
Chris Binnie
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.