I Don't Care About Your Band
Julie Klausner
Dark Invasion: 1915: Germany's Secret War and the Hunt for the ...
Howard Blum
The Complete MongoDB Atlas Tutorials: Learn End to End MongoDB ...
Hubchonsur Publications
The Little Book of Economics: How the Economy Works in the Real ...
Greg Ip
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Building Blockchain Apps
Michael Yuan & Jae Kwon
Protecting Oracle Database 12c
Paul Wright
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
The Zenith Angle
Bruce Sterling
Permanent Record
Edward Snowden
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Security Consulting
Charles A. Sennewald
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Federated Identity Primer
Derrick Rountree
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
HTML & XHTML: The Definitive Guide
Chuck Musciano
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Practical Security for Agile and DevOps
Mark S. Merkow
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
TLS Mastery
IT Mastery (16)
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Practical Linux Security Cookbook
Tajinder Kalsi
Linux Journal December 2013
Linux Journal
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Learn Windows IIS in a Month of Lunches
Jason Helmick
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro