Hunt the Lion
Chad Zunker
Sam Callahan (3)
Building ETL Pipelines With Python: Create and Deploy Enterprise-Ready ...
Brij Kishore Pandey & Emily Ro Schoof
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
The Elson Legacy
Lawrence De Maria
Alton Rhode (6)
The Pentagon's Brain
Annie Jacobsen
Phenomena: The Secret History of the U.S. Government's Investigations ...