Black As He's Painted
Ngaio Marsh
Roderick Alleyn (28)
The Joy of JavaScript
Luis Atencio
Skin Game
Stuart Woods
Teddy Fay (3)
Four Blind Mice
James Patterson
Alex Cross (8)
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
Joe Celko’s Complete Guide to NoSQL: What Every SQL Professional ...
Joe Celko
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Data Stewardship: An Actionable Guide to Effective Data Management ...
David Plotkin
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Federated Identity Primer
Derrick Rountree
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress