Listening to Stanley Kubrick: The Music in His Films
Christine Lee Gengaro
On the Run With Bonnie & Clyde
John Gilmore
Either You're in or You're in the Way: Two Brothers, Twelve ...
Logan Miller & Noah Miller
Whistled Like a Bird: The Untold Story of Dorothy Putnam, George ...
Sally Chapman & Stephanie Mansfield
Penetration Testing With Perl
Douglas Berdeaux
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
#DELETED: Big Tech's Battle to Erase a Movement and Subvert ...
Allum Bokhari
Spam: A Shadow History of the Internet
Finn Brunton
Dawn of the Code War: America's Battle Against Russia, China, ...
John P. Carlin & Garrett M. Graff
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
XML Hacks
Michael Fitzgerald
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Spooked: The Trump Dossier, Black Cube, and the Rise of Private ...
Barry Meier
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, ...
Parmy Olson
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Federated Identity Primer
Derrick Rountree
Program or Be Programmed: Ten Commandments for a Digital Age
Douglas Rushkoff