Deja Review Pathology
Jessica Davis & Emily King
The '85 Bears: We Were the Greatest
Mike Ditka
1981 - Hand Me a Fig Leaf
James Hadley Chase
Complete Works of Fyodor Dostoyevsky
Fyodor Dostoyevsky
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Dear Hacker
Emmanuel Goldstein
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
XML Hacks
Michael Fitzgerald
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Securing PHP Apps
Ben Edmunds
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Urban Emergency Survival Plan: Readiness Strategies for the ...
Jim Cobb
Prepper's Home Defense: Security Strategies to Protect Your ...
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Linux Networking Cookbook
Gregory Boyce
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Cloud Native Security
Chris Binnie & Rory McCune
Linux Server Security: Hack and Defend
Chris Binnie
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Penetration Testing With Perl
Douglas Berdeaux
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken