The World of Sugar: How the Sweet Stuff Transformed Our Politics, ...
Ulbe Bosma
Trying Leviathan: The Nineteenth-Century New York Court Case ...
D. Graham Burnett
Fireburst
Don Pendleton
The Executioner (186)
In the Electric Mist With Confederate Dead
James L. Burke
Dave Robicheaux (6)
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
ISC2 CISSP Certified Information Systems Security Professional ...
Mike Chapple & David Seidl
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Building Blockchain Apps
Michael Yuan & Jae Kwon
Permanent Record
Edward Snowden
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
TLS Mastery
Michael W. Lucas
IT Mastery (16)
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
Cloud Native Security
Chris Binnie & Rory McCune
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Practical Security for Agile and DevOps
Mark S. Merkow
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
CISA Certified Information Systems Auditor Study Guide: Covers ...
Peter H. Gregory & Mike Chapple