Drunk With Blood: God's Killings in the Bible
Steve Wells
Over the Edge
Stuart Pawson
DI Charlie Priest (10)
Slow Kill
Michael McGarrity
Kevin Kerney (9)
Extreme Prey
John Sandford
Lucas Davenport (26)
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
CISA Certified Information Systems Auditor Study Guide: Covers ...
Peter H. Gregory & Mike Chapple
Cloud Native Security
Chris Binnie & Rory McCune
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Elastix Unified Communications Server Cookbook
Gerardo Barajas Puente
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
ISC2 CISSP Certified Information Systems Security Professional ...
Mike Chapple & David Seidl
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Learning Nessus for Penetration Testing
Himanshu Kumar
Linux Server Security: Hack and Defend
Chris Binnie
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
NoSQL Web Development With Apache Cassandra
Deepak Vohra
TLS Mastery
Michael W. Lucas
IT Mastery (16)
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman