Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Jacob G. Oakley
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Rust Programming Language
Steve Klabnik & Carol Nichols
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Hadoop: The Definitive Guide
Tom White
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
JavaScript: The Definitive Guide
David Flanagan
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
Java Performance: The Definitive Guide
Scott Oaks
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
Maven: The Definitive Guide
Sonatype Company
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Civil War Stories: A 150th Anniversary Collection
The Washington Post
Brain Hacking
Amy Ellis Nutt
The Cost of Clemency: The lives of 46 former prisoners whose ...
Holiday Cookies: 45 of Our Best Recipes
Ferguson: Three Minutes that Changed America
Generation Z: What It's Like to Grow up in the Age of Likes, ...
The Hunt for Bin Laden
Justice in Indian Country
Sari Horwitz
Justice For None: How the Drug War Broke the Legal System
The Kennedy Baby: The Loss That Transformed JFK
Steven Levingston
Lethal Force: The True Toll of Police Shootings in America
Ansible for Kubernetes
Jeff Geerling
Looking for America: A journey into the country's dividied heart
David Maraniss & Robert Samuels
Ansible for DevOps
NSA Secrets: Government Spying in the Internet Age
Obama's Legacy
Runaway Planet: How Global Warming is Already Changing the Earth
State Of Terror: The War Against ISIS
The Original Watergate Stories
The Permanent War: Rise of the Drones
The Resistance: Digital Dissent in the Age of Machines
Joel Achenbach
The Threatened Net: How the Web Became a Perilous Place
Craig Timberg
Zero Day: The Threat in Cyberspace
Robert O'Harrow Jr.
A Marine on Trial
John Woodrow Cox
C# in Depth, Fourth Edition
Jon Skeet
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
The Ida Pro Book
Chris Eagle
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Investigating Cryptocurrencies
Nick Furneaux
Reversing: Secrets of Reverse Engineering
Eldad Eilam
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Applied Cryptography
Bruce Schneier
Security Engineering
Ross J. Anderson
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Tribe of Hackers
We Have Root
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Social Engineering: The Science of Human Hacking
Christopher Hadnagy