Cold Paradise
Stuart Woods
Stone Barrington (7)
Worst Case Scenario: A Novel
T. J. Newman
Seeing and Believing
Norah McClintock
Mike and Riel (4)
Two for the Money
Max Allan Collins
Hard Case Crime (1)
Penetration Testing With Perl
Douglas Berdeaux
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
#DELETED: Big Tech's Battle to Erase a Movement and Subvert ...
Allum Bokhari
Spam: A Shadow History of the Internet
Finn Brunton
Dawn of the Code War: America's Battle Against Russia, China, ...
John P. Carlin & Garrett M. Graff
Android Hacker's Handbook
Joshua J. Drake & Zach Lanier & Collin Mulliner & Pau Oliva Fora & Stephen A. Ridley & Georg Wicherski
XML Hacks
Michael Fitzgerald
This Machine Kills Secrets: Julian Assange, the Cypherpunks, ...
Andy Greenberg
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Spooked: The Trump Dossier, Black Cube, and the Rise of Private ...
Barry Meier
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, ...
Parmy Olson
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
Federated Identity Primer
Derrick Rountree
Program or Be Programmed: Ten Commandments for a Digital Age
Douglas Rushkoff