You're Not Doing It Right: Tales of Marriage, Sex, Death, and ...
Michael Ian Black
The Uncrowned King: The Sensational Rise of William Randolph ...
Kenneth Whyte
F*ck Silence: Calling Trump Out for the Cultish, Moronic, Authoritarian ...
Joe Walsh
Auto Biography: A Classic Car, an Outlaw Motorhead, and 57 Years ...
Earl Swift
War Play: Video Games and the Future of Armed Conflict
Corey Mead
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
When Computers Were Human
David Alan Grier
It Began With Babbage: The Genesis of Computer Science
Subrata Dasgupta
Python For Informatics: Exploring Information
Charles Severance
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
The New Digital Age
Jared Cohen & Eric Schmidt
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Security Consulting
Charles A. Sennewald
Quantum Computing Since Democritus
Scott Aaronson
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Federated Identity Primer
Derrick Rountree
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Jump Start Responsive Web Design
Craig Sharkie & Andrew Fisher
Instant Hyper-V Server Virtualization Starter
Vicente Rodriguez Eguibar
Big Data: A Revolution That Will Transform How We Live, Work, ...
Viktor Mayer-Schönberger & Kenneth Niel Cukier
Beginning Database Design: From Novice to Professional
Clare Churcher
Doing Bayesian Data Analysis: A Tutorial With R and BUGS
John K. Kruschke
Professional Node.js: Building Javascript Based Scalable Software
Pedro Teixeira
Wordpress Mobile Applications With PhoneGap
Liang Yuxian Eugene
Network Backup With Bacula
Yauheni V. Pankov
Laravel Starter
Shawn McCool
KnockoutJS Starter
Eric Barnard
Getting Started With Raspberry Pi
Matt Richardson & Shawn Wallace
Windows 8 XAML Primer
Jesse Liberty
Circos Data Visualization How-To
Tom Schenk Jr
SAP HANA Starter
Mark Walker
Drupal Rules How-To
Robert Varkonyi
Networking All-In-One for Dummies
Doug Lowe
Jump Start Node.Js
Don Nguyen
Jump Start CoffeeScript
Ricardo Tomasi
Pro HTML5 Performance
Jay Bryant & Mike Jones
Introducing .Net 4.5
Alex Mackey & William Stewart Tulloch & Mahesh Krishnan
Pro HTML5 With Visual Studio 2012
Mark Collins
Beginning R: An Introduction to Statistical Programming
Larry Pace
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Foundation Version Control for Web Developers
Chris Kemper & Ian Oxley
Practical Arduino Engineering
Harold Timmis
Beginning CSS3
David Powers
The Robert C. Martin Clean Code Collection
Robert C Martin
Selenium 2 Testing Tools: Beginner's Guide
David Burns
Exam Ref 70-410: Installing and Configuring Windows Server 2012
Ian McLean & Craig Zacker
CLR via C#
Jeffrey Richter
iPad Enterprise Application Development BluePrints
Steven Frank Daniel
Restlet in Action: Developing RESTful Web APIs in Java
Jerome Louvel & Thierry Templier & Thierry Boileau