Post Corona: From Crisis to Opportunity
Scott Galloway
Deadly Payload
Don Pendleton
Stony Man (93)
Report of Investigation: Security Failures at the United States ...
Andrea Porwoll
Bad Data Handbook
Q. Ethan McCallum
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Penetration Testing With Perl
Douglas Berdeaux
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Linux Server Security: Hack and Defend
Chris Binnie
Cloud Native Security
Chris Binnie & Rory McCune
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Linux Networking Cookbook
Gregory Boyce
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Prepper's Home Defense: Security Strategies to Protect Your ...
Jim Cobb
Urban Emergency Survival Plan: Readiness Strategies for the ...
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Securing PHP Apps
Ben Edmunds
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
XML Hacks
Michael Fitzgerald
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Dear Hacker
Emmanuel Goldstein
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
Learn Windows IIS in a Month of Lunches
Jason Helmick
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Linux Journal December 2013
Linux Journal
Practical Linux Security Cookbook
Tajinder Kalsi
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
TLS Mastery
IT Mastery (16)
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Practical Security for Agile and DevOps
Mark S. Merkow