In the Name of Salome
Julia Alvarez
By the Skin of My Teeth: The Memoirs of an RAF Mustang Pilot ...
Colin Downes
Dangerous Games
John Shannon
Jack Liffey (8)
The Shredded Chef: 114 Recipes for Building Muscle, Getting ...
Michael Matthews
Everybody Kills Somebody Sometime
Robert J. Randisi
One Dead Seagull
Scot Gardner
Mr. Monk on Patrol
Lee Goldberg
The Ophelia Cut
John Lescroart
Dismas Hardy (17)
The Radio Magician and Other Stories
James Van Pelt
Flying in the Heart of the Lafayete Escadrille
Jacob's Ladder: Wisdom for the Heart's Ascent
Noah Benshea
Jacob's Journey: Wisdom to Find the Way, Strength to Carry On
Jacob the Baker
Inferno
Dan Brown
How to Create the Perfect Wife: Britain's Most Ineligible Bachelor ...
Wendy Moore
Legacy of a Spy
Henry S. Maxfield
Powder and Patch
Georgette Heyer
An Infamous Army: A Novel of Love, War, Wellington and Waterloo
Alastair (3)
Devil's Cub
Alastair (2)
These Old Shades
Alastair (1)
Equal of the Sun: A Novel
Anita Amirrezvani
Princess Charming
Elizabeth Thornton
Whisper His Name
The Stationmaster's Farewell
Edward Marston
Inspector Colbeck (9)
The Elephants of Norwich
Domesday (11)
Peril on the Royal Train
Inspector Colbeck (10)
Lord Peter Views the Body
Dorothy L. Sayers
Lord Peter Wimsey (4)
Death on a Pale Horse: Sherlock Holmes on Her Majesty's Secret ...
Donald Thomas
Bunker Hill: A City, a Siege, a Revolution
Nathaniel Philbrick
American Revolution (1)
Love Is Strange
Bruce Sterling
The VICTORS : Eisenhower and His Boys: The Men of World War ...
Stephen E. Ambrose
Life Is Elsewhere
Milan Kundera
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Low Tech Hacking: Street Smarts for Security Professionals
Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Federated Identity Primer
Derrick Rountree
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Web Audio API
Boris Smus
Twisted Network Programming Essentials
Jessica McKellar & Abe Fettig
Jump Start Responsive Web Design
Craig Sharkie & Andrew Fisher
Embedded Android
Karim Yaghmour
User-Centered Design
Travis Lowdermilk
Interactive Data Visualization for the Web
Scott Murray
Industrial Internet
Jon Bruner
Big Data Now: 2012 Edition
O’Reilly Media, Inc.
Nmap 6: Network Exploration and Security Auditing Cookbook
Paulino Calderon Pale
Redemption
William W. Johnstone
Dangerous Ground
Larry Bond
Jerry Mitchell (1)
Cold Choices
Jerry Mitchell (2)
Exit Plan
Jerry Mitchell (3)
The Enemy Within
Thorn & Gray (1)
Day of Wrath
Thorn & Gray (2)
Vortex
First Team
Larry Bond & Jim DeFelice
First Team (1)
Angels of Wrath
First Team (2)