Using Asyncio in Python: Understanding Python's Asynchronous ...
Caleb Hattingh
Boatowner's Illustrated Electrical Handbook
Charlie Wing
The Daffodil Affair
Michael Innes
Inspector Appleby (8)
The Summer of the Danes
Ellis Peters
Brother Cadfael (18)
Zero Trust Networks, Second Edition
Razi Rais & Christina Morillo & Evan Gilman & Doug Barth
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative ...
Clint E. Bodungen
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Richard Greene & Rachel Robison-Greene
Mastering Linux Device Driver Development: Write Custom Device ...
John Madieu
Policy as Code: Improving Cloud-Native Security
Jimmy Ray
Zero Trust Networks: Building Secure Systems in Untrusted Network
Razi Rais & Christina Morillo & Evan Gilman
Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection ...
Matt Hand
Ansible for Amazon Web Services AWS by Examples: 10+ Examples ...
Luca Berton
DeFi and the Future of Finance
Campbell R. Harvey & Ashwin Ramachandran & Joey Santoro
Beginning AWS Security: Build Secure, Effective, and Efficient ...
Tasha Penwell
The NSA Report: Liberty and Security in a Changing World
President's Review Group On Intelligence & Communications Technologies, The & Richard A. Clarke & Michael J. Morell & Geoffrey R. Stone & Cass R. Sunstein & Peter Swire
Understanding the Digital World: What You Need to Know About ...
Brian W. Kernighan
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher
Automating DevOps with GitLab CI/CD Pipelines
Christopher Cowell, Nicholas Lotz & Chris Timberlake
Blockchain Tethered AI: Trackable, Traceable Artificial Intelligence ...
Karen Kilroy & Lynn Riley & Deepak Bhatta
Mobile Forensics – the File Format Handbook: Common File Formats ...
Christian Hummert & Dirk Pawlaszczyk
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Black Hat GraphQL: Attacking Next Generation APIs
Nick Aleks & Dolev Farhi
Archives in the Digital Age: Preservation and the Right to Be ...
Abderrazak Mkadmi
TLS Mastery
Michael W. Lucas
IT Mastery (16)
Linux Server Security: Hack and Defend
Chris Binnie
Cloud Native Security
Chris Binnie & Rory McCune
Powershell in Depth, Second Edition
Don Jones & Jeffery Hicks & Richard Siddaway
Learn Windows IIS in a Month of Lunches
Jason Helmick
Learn Active Directory Management in a Month of Lunches
Richard Siddaway
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman
NoSQL Web Development With Apache Cassandra
Deepak Vohra
Learn Cisco Network Administration in a Month of Lunches
Ben Piper
Defending IoT Infrastructures With the Raspberry Pi: Monitoring ...
Chet Hosmer
Practical Security for Agile and DevOps
Mark S. Merkow
Modern System Administration: Building and Maintaining Reliable ...
Jennifer Davis
Mastering Defensive Security: Effective Techniques to Secure ...
Cesar Bravo & Darren Kitchen
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Practical Linux Forensics: A Guide for Digital Investigators
Bruce Nikkel
Splunk Certified Study Guide: Prepare for the User, Power User, ...
Deep Mehta
The Digital Silk Road: China's Quest to Wire the World and Win ...
Jonathan E. Hillman
Getting Started With Deep Learning for Natural Language Processing: ...
Sunil Patel
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based ...
Ahmed Sheikh
Infrastructure-As[..] Automation Using Terraform, Packer, Vault, ...
Navin Sabharwal & Sarvesh Pandey & Piyush Pandey
Python Testing With Selenium: Learn to Implement Different Testing ...
Sujay Raghavendra
Set Up and Manage Your Virtual Private Server: Making System ...
Jon Westfall
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Mastering Ethereum: Building Smart Contracts and DApps
Andreas M. Antonopoulos & Gavin Wood Ph.d.
Cryptocurrencies and the Blockchain Revolution: Bitcoin and ...
Brendan January
The Bitcoin Standard: The Decentralized Alternative to Central ...
Saifedean Ammous
Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime ...
Kevin Poulsen
The Cyber Effect: A Pioneering Cyberpsychologist Explains How ...
Mary Aiken
Permanent Record
Edward Snowden
Serious Python: Black-Belt Advice on Deployment, Scalability, ...
Julien Danjou
Building Blockchain Apps
Michael Yuan & Jae Kwon
Prepper's Home Defense: Security Strategies to Protect Your ...
Jim Cobb
Urban Emergency Survival Plan: Readiness Strategies for the ...
Penetration Testing With Perl
Douglas Berdeaux
Sudo Mastery: User Access Control for Real People
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
HTML & XHTML: The Definitive Guide
Chuck Musciano
XML Hacks
Michael Fitzgerald
Practical Linux Security Cookbook
Tajinder Kalsi
Linux Networking Cookbook
Gregory Boyce
Practical LPIC-1 Linux Certification Study Guide
David Clinton