Kim
Rudyard Kipling
Get Rich Slow: Start Now, Start Small to Achieve Real Wealth
Sarah Riegelhuth
Tiger's Claw
Dale Brown
Patrick McLanahan (18)
Uncle John's Presents Book of the Dumb
Bathroom Readers' Institute
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Practical Security for Agile and DevOps
Mark S. Merkow
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Learn Windows IIS in a Month of Lunches
Jason Helmick
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Cloud Native Security
Chris Binnie & Rory McCune
Linux Server Security: Hack and Defend
Chris Binnie
TLS Mastery
Michael W. Lucas
IT Mastery (16)
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth