Worth Dying For
Lee Child
Jack Reacher (15)
The Crossing
Michael Connelly
Harry Bosch (19)
Churchill's Bomb: How the United States Overtook Britain in ...
Graham Farmelo
The Disappearing Spoon: And Other True Tales of Madness, Love, ...
Sam Kean
Exam Ref 70-410: Installing and Configuring Windows Server 2012
Ian McLean & Craig Zacker
Selenium 2 Testing Tools: Beginner's Guide
David Burns
The Robert C. Martin Clean Code Collection
Robert C Martin
Beginning CSS3
David Powers
Practical Arduino Engineering
Harold Timmis
Foundation Version Control for Web Developers
Chris Kemper & Ian Oxley
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Beginning R: An Introduction to Statistical Programming
Larry Pace
Pro HTML5 With Visual Studio 2012
Mark Collins
Introducing .Net 4.5
Alex Mackey & William Stewart Tulloch & Mahesh Krishnan
Pro HTML5 Performance
Jay Bryant & Mike Jones
Jump Start CoffeeScript
Ricardo Tomasi
Jump Start Node.Js
Don Nguyen
Networking All-In-One for Dummies
Doug Lowe
Drupal Rules How-To
Robert Varkonyi
SAP HANA Starter
Mark Walker
Circos Data Visualization How-To
Tom Schenk Jr
Windows 8 XAML Primer
Jesse Liberty
Getting Started With Raspberry Pi
Matt Richardson & Shawn Wallace
KnockoutJS Starter
Eric Barnard
Laravel Starter
Shawn McCool
Network Backup With Bacula
Yauheni V. Pankov
Wordpress Mobile Applications With PhoneGap
Liang Yuxian Eugene
Professional Node.js: Building Javascript Based Scalable Software
Pedro Teixeira
Doing Bayesian Data Analysis: A Tutorial With R and BUGS
John K. Kruschke
Beginning Database Design: From Novice to Professional
Clare Churcher
Big Data: A Revolution That Will Transform How We Live, Work, ...
Viktor Mayer-Schönberger & Kenneth Niel Cukier
Instant Hyper-V Server Virtualization Starter
Vicente Rodriguez Eguibar
Jump Start Responsive Web Design
Craig Sharkie & Andrew Fisher
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Federated Identity Primer
Derrick Rountree
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Quantum Computing Since Democritus
Scott Aaronson
Security Consulting
Charles A. Sennewald
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
The New Digital Age
Jared Cohen & Eric Schmidt
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Python For Informatics: Exploring Information
Charles Severance
It Began With Babbage: The Genesis of Computer Science
Subrata Dasgupta
When Computers Were Human
David Alan Grier
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
War Play: Video Games and the Future of Armed Conflict
Corey Mead
Programming Arduino Next Steps: Going Further With Sketches
Simon Monk
Beginning C for Arduino: Learn C Programming for the Arduino
Jack Purdum
Beginning Sensor Networks With Arduino and Raspberry Pi
Charles Bell