No More Dying Then
Ruth Rendell
Inspector Wexford Mysteries (6)
The Other Woman
Daniel Silva
Gabriel Allon (18)
Tanner on Ice
Lawrence Block
Evan Tanner (8)
Against All Odds: My Story
Chuck Norris
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Learn Windows IIS in a Month of Lunches
Jason Helmick
Linux Journal December 2013
Linux Journal
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Federated Identity Primer
Derrick Rountree
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Security Consulting
Charles A. Sennewald
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Prepper's Home Defense: Security Strategies to Protect Your ...
Jim Cobb
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Dear Hacker
Emmanuel Goldstein
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
XML Hacks
Michael Fitzgerald
The Zenith Angle
Bruce Sterling
HTML & XHTML: The Definitive Guide
Chuck Musciano