The Case of the Haunted Husband: A Perry Mason Mystery
Erle Stanley Gardner
Perry Mason (18)
The Novel Cure: From Abandonment to Zestlessness: 751 Books ...
Ella Berthoud & Susan Elderkin
Desert Star
Michael Connelly
Harry Bosch (24)
The Complete Family Office Handbook: A Guide for Affluent Families ...
Kirby Rosplock
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
NoSQL Web Development With Apache Cassandra
Deepak Vohra
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Penetration Testing With Perl
Douglas Berdeaux
Permanent Record
Edward Snowden
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Practical Linux Security Cookbook
Tajinder Kalsi
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical Security for Agile and DevOps
Mark S. Merkow
Prepper's Home Defense: Security Strategies to Protect Your ...
Jim Cobb
Protecting Oracle Database 12c
Paul Wright
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Securing PHP Apps
Ben Edmunds
Security Consulting
Charles A. Sennewald
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
TLS Mastery
IT Mastery (16)
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Urban Emergency Survival Plan: Readiness Strategies for the ...
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
XML Hacks
Michael Fitzgerald
The Zenith Angle
Bruce Sterling
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman