Axeman's Jazz: A Female Cop, an Obsessed Killer, an Offbeat ...
Julie Smith
Economies of Recycling: The Global Transformation of Materials, ...
Joshua Reno & Catherine Alexer
Harry Potter and the Cursed Child: Parts One and Two
J. K. Rowling
30-Minute Get Real Meals: Eat Healthy Without Going to Extremes
Rachael Ray
Devil's Cub
Georgette Heyer
Alastair (2)
These Old Shades
Alastair (1)
Equal of the Sun: A Novel
Anita Amirrezvani
Princess Charming
Elizabeth Thornton
Whisper His Name
The Stationmaster's Farewell
Edward Marston
Inspector Colbeck (9)
The Elephants of Norwich
Domesday (11)
Peril on the Royal Train
Inspector Colbeck (10)
Lord Peter Views the Body
Dorothy L. Sayers
Lord Peter Wimsey (4)
Death on a Pale Horse: Sherlock Holmes on Her Majesty's Secret ...
Donald Thomas
Bunker Hill: A City, a Siege, a Revolution
Nathaniel Philbrick
American Revolution (1)
Love Is Strange
Bruce Sterling
The VICTORS : Eisenhower and His Boys: The Men of World War ...
Stephen E. Ambrose
Life Is Elsewhere
Milan Kundera
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Federated Identity Primer
Derrick Rountree
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Web Audio API
Boris Smus
Twisted Network Programming Essentials
Jessica McKellar & Abe Fettig
Jump Start Responsive Web Design
Craig Sharkie & Andrew Fisher
Embedded Android
Karim Yaghmour
User-Centered Design
Travis Lowdermilk
Interactive Data Visualization for the Web
Scott Murray
Industrial Internet
Jon Bruner
Big Data Now: 2012 Edition
O’Reilly Media, Inc.
Nmap 6: Network Exploration and Security Auditing Cookbook
Paulino Calderon Pale
Redemption
William W. Johnstone
Dangerous Ground
Larry Bond
Jerry Mitchell (1)
Cold Choices
Jerry Mitchell (2)
Exit Plan
Jerry Mitchell (3)
The Enemy Within
Thorn & Gray (1)
Day of Wrath
Thorn & Gray (2)
Vortex
First Team
Larry Bond & Jim DeFelice
First Team (1)
Angels of Wrath
First Team (2)
Fires of War
First Team (3)
Soul of the Assassin
First Team (4)
Shadows of War
Red Dragon Rising (1)
Edge of War
Red Dragon Rising (2)
Shock of War
Red Dragon Rising (3)
Blood of War
Red Dragon Rising (4)
Perilous Skies
Don Pendleton
Stony Man (123)
Primal Fear
William Diehl
Martin Vail (1)
Robert B. Parker's Wonderland
Ace Atkins
Waiting for the Barbarians: Essays From the Classics to Pop ...
Daniel Mendelsohn
Assault of the Mountain Man
Mountain Man (39)
Savagery of the Mountain Man
Mountain Man (37)
Bloodshed of Eagles
William W. Johnstone & J. A. Johnstone
Eagles (14)
Phoenix Rising
Phoenix Rising (1)