Face to the Sun
Geoffrey Household
Death in Show
Judi McCoy
Really the Blues
Mezz Mezzrow
Nothing Stays Buried
P. J. Tracy
Monkeewrench (8)
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Practical Security for Agile and DevOps
Mark S. Merkow
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
Cloud Native Security
Chris Binnie & Rory McCune
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
TLS Mastery
Michael W. Lucas
IT Mastery (16)
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Permanent Record
Edward Snowden
Building Blockchain Apps
Michael Yuan & Jae Kwon
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Practical LPIC-1 Linux Certification Study Guide
David Clinton
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
Securing PHP Apps
Ben Edmunds
Linux Networking Cookbook
Gregory Boyce
Linux Server Security: Hack and Defend
Chris Binnie
Practical Linux Security Cookbook
Tajinder Kalsi
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
Penetration Testing With Perl
Douglas Berdeaux
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Protecting Oracle Database 12c
Paul Wright
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Urban Emergency Survival Plan: Readiness Strategies for the ...
Jim Cobb