Olga Dies Dreaming: A Novel
xochitl gonzalez
Clutching at Straws
Ruth Rendell
Down on the Farm
Charles Stross
Laundry Files (3)
Red Velvet Cupcake Murder
Joanne Fluke
Hannah Swensen (16)
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
Dear Hacker
Emmanuel Goldstein
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Cyber war: the next threat to national security and what to ...
Richard A. Clarke & Robert K. Knake
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
Countdown to Zero Day: Stuxnet and the Launch of the World's ...
Kim Zetter
Cloud Native Security
Chris Binnie & Rory McCune
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
The CERT Oracle Secure Coding Standard for Java
Fred Long & Dhruv Mohindra & Robert C. Seacord & Dean F. Sutherland & David Svoboda
Building Blockchain Apps
Michael Yuan & Jae Kwon
Building a Comprehensive IT Security Program: Practical Guidelines ...
Jeremy Wittkop
The Browser Hacker's Handbook
Wade Alcorn & Christian Frichot & Michele Orru
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin Mitnick
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole