Advanced Elasticsearch 7. 0: A Practical Guide to Designing, ...
Wai Tak Wong
Unconditional Surrender: The Policy That Prolonged World War ...
Thomas Fleming
The Feminist Promise
Christine Stansell
Mr. Midshipman Hornblower
C. S. Forester
Hornblower (1)
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
XML Hacks
Michael Fitzgerald
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, ...
Parmy Olson
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
Spooked: The Trump Dossier, Black Cube, and the Rise of Private ...
Barry Meier
Spam: A Shadow History of the Internet
Finn Brunton
Program or Be Programmed: Ten Commandments for a Digital Age
Douglas Rushkoff
Penetration Testing With Perl
Douglas Berdeaux
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Federated Identity Primer
Derrick Rountree
Dawn of the Code War: America's Battle Against Russia, China, ...
John P. Carlin & Garrett M. Graff
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
#DELETED: Big Tech's Battle to Erase a Movement and Subvert ...
Allum Bokhari