Python GUI Programming With PAGE: Create Professional-Looking ...
Gregory Walters
The Woman Warrior: Memoirs of a Girlhood Among Ghosts
Maxine Hong Kingston
El Sicario: The Autobiography of a Mexican Assassin
Sicario
Flying Blind: The 737 MAX Tragedy and the Fall of Boeing
Peter Robison
Penetration Testing With Perl
Douglas Berdeaux
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
#DELETED: Big Tech's Battle to Erase a Movement and Subvert ...
Allum Bokhari
Spam: A Shadow History of the Internet
Finn Brunton
Dawn of the Code War: America's Battle Against Russia, China, ...
John P. Carlin & Garrett M. Graff
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
XML Hacks
Michael Fitzgerald
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Spooked: The Trump Dossier, Black Cube, and the Rise of Private ...
Barry Meier
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, ...
Parmy Olson
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Federated Identity Primer
Derrick Rountree
Program or Be Programmed: Ten Commandments for a Digital Age
Douglas Rushkoff