Mauve Gloves & Madmen, Clutter & Vine: And Other Stories, Sketches, ...
Tom Wolfe
Blast From The Past
Ben Elton
The Hostile Shore
Douglas Reeman
In Time of War (Part Six of The People of this Parish Saga)
Nicola Thorne
HTML & XHTML: The Definitive Guide
Chuck Musciano
The Zenith Angle
Bruce Sterling
XML Hacks
Michael Fitzgerald
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
Dear Hacker
Emmanuel Goldstein
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Brett Shavers
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Prepper's Home Defense: Security Strategies to Protect Your ...
Jim Cobb
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Federated Identity Primer
Derrick Rountree
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Security Consulting
Charles A. Sennewald
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
Linux Journal December 2013
Linux Journal
Learn Windows IIS in a Month of Lunches
Jason Helmick
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Urban Emergency Survival Plan: Readiness Strategies for the ...
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Protecting Oracle Database 12c
Paul Wright
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Penetration Testing With Perl
Douglas Berdeaux
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Practical Linux Security Cookbook
Tajinder Kalsi
Linux Server Security: Hack and Defend
Chris Binnie
Linux Networking Cookbook
Gregory Boyce
Securing PHP Apps
Ben Edmunds
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma