The Only Plane in the Sky: An Oral History of 9/11
Garrett M. Graff
Yogi: The Life & Times of an American Original
Carlo DeVito
Mac and Cheese Recipes: A Creative Collection of Recipes That ...
Ready Recipe Books
For All Their Lives
Fern Michaels
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Dear Hacker
Emmanuel Goldstein
The Zenith Angle
Bruce Sterling
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Federated Identity Primer
Derrick Rountree
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Security Consulting
Charles A. Sennewald
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Linux Journal December 2013
Linux Journal
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Protecting Oracle Database 12c
Paul Wright
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
Securing PHP Apps
Ben Edmunds
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Linux Networking Cookbook
Gregory Boyce
Practical Linux Security Cookbook
Tajinder Kalsi
XML Hacks
Michael Fitzgerald
HTML & XHTML: The Definitive Guide
Chuck Musciano
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
Penetration Testing With Perl
Douglas Berdeaux
Prepper's Home Defense: Security Strategies to Protect Your ...
Jim Cobb
Urban Emergency Survival Plan: Readiness Strategies for the ...
Building Blockchain Apps
Michael Yuan & Jae Kwon
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Permanent Record
Edward Snowden
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh