The Silicon Shrink: How Artificial Intelligence Made the World ...
Daniel Oberhaus
CCNA Cisco Certified Network Associate Study Guide (7th Ed)
Todd Lammle
Nerve
Dick Francis
Black Eagle
Jack Slater
Jason Trapp Thriller (6)
Data Stewardship: An Actionable Guide to Effective Data Management ...
David Plotkin
Joe Celko’s Complete Guide to NoSQL: What Every SQL Professional ...
Joe Celko
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Federated Identity Primer
Derrick Rountree
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman