The Camel Club
David Baldacci
The Camel Club (1)
Predator: The Secret Origins of the Drone Revolution
Richard Whittle
Introvert Power: Why Your Inner Life Is Your Hidden Strength
Laurie Helgoe
The Medicine Book: Big Ideas Simple Explained
Dorling Kindersley
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
HTML & XHTML: The Definitive Guide
Chuck Musciano
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Federated Identity Primer
Derrick Rountree
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Security Consulting
Charles A. Sennewald
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Permanent Record
Edward Snowden
The Zenith Angle
Bruce Sterling
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
Protecting Oracle Database 12c
Paul Wright
Building Blockchain Apps
Michael Yuan & Jae Kwon
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter