Competitive Advantage Through People: Unleashing the Power of ...
Jeffrey Pfeffer
Give Me Back My Legions!
Harry Turtledove
The Case of the Shapely Shadow
Erle Stanley Gardner
Perry Mason (66)
The Gospel According to Judas by Benjamin Iscariot
Jeffrey Archer
#DELETED: Big Tech's Battle to Erase a Movement and Subvert ...
Allum Bokhari
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Dawn of the Code War: America's Battle Against Russia, China, ...
John P. Carlin & Garrett M. Graff
Federated Identity Primer
Derrick Rountree
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Penetration Testing With Perl
Douglas Berdeaux
Program or Be Programmed: Ten Commandments for a Digital Age
Douglas Rushkoff
Spam: A Shadow History of the Internet
Finn Brunton
Spooked: The Trump Dossier, Black Cube, and the Rise of Private ...
Barry Meier
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, ...
Parmy Olson
XML Hacks
Michael Fitzgerald
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman