Pro SQL Server 2012 Practices
Grant Fritchey & A. Driscoll & Bradley Ball & TJay Belt & Glenn Berry & Jes Borland & Carlos Bossy & Louis Davidson & Jeremy Lowell & Ben DeBow & Wendy Pastrick & Kellyn Pot'vin & Jonathan Gardner & Jesper Johansen
The Art of Aging: A Doctor's Prescription for Well-Being
Sherwin B. Nuland
Ecology or Catastrophe: The Life of Murray Bookchin
Janet Biehl
Effective STL: 50 Specific Ways to Improve Your Use of the Standard ...
Scott Douglas Meyers
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
The Zenith Angle
Bruce Sterling
XML Hacks
Michael Fitzgerald
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Urban Emergency Survival Plan: Readiness Strategies for the ...
Jim Cobb
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
TLS Mastery
Michael W. Lucas
IT Mastery (16)
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Sudo Mastery: User Access Control for Real People
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Security Intelligence: A Practitioner's Guide to Solving Enterprise ...
Qing Li & Gregory Clark
Security Consulting
Charles A. Sennewald
Securing PHP Apps
Ben Edmunds
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Protecting Oracle Database 12c
Paul Wright
Prepper's Home Defense: Security Strategies to Protect Your ...
Practical Security for Agile and DevOps
Mark S. Merkow
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical Lock Picking: A Physical Penetration Tester's Training ...
Deviant Ollam
Practical Linux Security Cookbook
Tajinder Kalsi
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Permanent Record
Edward Snowden
Penetration Testing With Perl
Douglas Berdeaux
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Linux Server Security: Hack and Defend
Chris Binnie
Linux Networking Cookbook
Gregory Boyce
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Linux Journal December 2013
Linux Journal
Learn Windows IIS in a Month of Lunches
Jason Helmick
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Kali Linux - an Ethical Hacker's Cookbook: End-To-End Penetration ...
Himanshu Sharma
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
HTML & XHTML: The Definitive Guide
Chuck Musciano
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Federated Identity Primer
Derrick Rountree
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman