The Great Simolean Caper
Neal Stephenson
What Makes Civilization?: The Ancient Near East and the Future ...
David Wengrow
The Case of the Drowsy Mosquito
Erle Stanley Gardner
Perry Mason (23)
The Concise Oxford Dictionary of Music
Percy A. Scholes & Michael Kennedy
CISSP Study Guide
Eric Conrad & Seth Misenar & Joshua Feldman
Client Side Attacks and Defense
Sean-Philip Oriyano & Robert Shimonski
Information Security Risk Assessment Toolkit: Practical Assessments ...
Mark Talabis & Jason Martin
Advanced Persistent Threat: Understanding the Danger and How ...
Eric Cole
Cybercrime Investigation Case Studies: An Excerpt From Placing ...
Brett Shavers
Network Intrusion Analysis: Methodologies, Tools, and Techniques ...
Joe Fichera & Steven Bolt
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Federated Identity Primer
Derrick Rountree
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Joe Celko’s Complete Guide to NoSQL: What Every SQL Professional ...
Joe Celko
Data Stewardship: An Actionable Guide to Effective Data Management ...
David Plotkin