Scrum For Dummies

Scrum for Dummies
ByMark C. Layton,David Morrow
@Dsero465
Last finished on
Getting Your First Job For Dummies

@Dsero465
Added on
Programming Interviews For Dummies

Programming Interviews For Dummies
ByEric Butow,John Z. Sonmez
@Dsero465
Last finished on
Getting an IT Help Desk Job for Dummies

@Dsero465
Last finished on
Job Search Letters for Dummies

Job Search Letters for Dummies
ByJoyce Lain Kennedy
@Dsero465
Last finished on
C# 7.0 All-in-One For Dummies

C# 7.0 All-in-One For Dummies
ByJohn Paul Mueller,Chuck Sphar
@Dsero465
Last finished on
DevOps for Dummies

DevOps for Dummies
BySanjeev Sharma
@Dsero465
Last finished on
Mindful Being

#4 of 2 in AoL Mindfulness

@Dsero465
Last finished on
Beginning Programming with Python For Dummies

@Dsero465
Last finished on
Everyday Life in Medieval England

@Dsero465
Added on

1994 • 1 Reader

The Merchant Class of Medieval London: 1300-1500

@Dsero465
Added on

1989 • 1 Reader • 420 pages

We Are Dandy: The Elegant Gentleman around the World

@Dsero465
Added on

2016 • 1 Reader • 304 pages

I Am Dandy: The Return of the Elegant Gentleman

@Dsero465
Added on

2013 • 1 Reader • 288 pages

Something Deeply Hidden

@Dsero465
Added on

95 Readers 3.8

One Who Walked Alone – Robert E. Howard: The Final Years

@Dsero465
Added on

1986 • 1 Reader • 317 pages

A Means to Freedom: The Letters of H. P. Lovecraft and Robert E. Howard, Vol 1: 1930-32

#1 of 1 in The Letters of H.P. Lovecraft & Robert E. Howard

@Dsero465
Added on

2017 • 1 Reader • 512 pages

Hafted Weapons in Medieval and Renaissance Europe: The Evolution of European Staff Weapons Between 1200 and 1650

@Dsero465
Added on

2004 • 1 Reader • 223 pages

Warfare in the classical world

@Dsero465
Added on

1980 • 3 Readers • 224 pages

We Have Root: Even More Advice from Schneier on Security

@Dsero465
Last finished on
Cryptography Engineering: Design Principles and Practical Applications

@Dsero465
Last finished on
Malware Analyst's Cookbook and DVD

Malware Analyst's Cookbook and DVD
ByMichael Ligh,Steven Adair,+2 more
@Dsero465
Last finished on
Cybersecurity Blue Team Toolkit

@Dsero465
Last finished on
Wolf of Wessex

Wolf of Wessex
ByMatthew Harffy
@Dsero465
Added on

2019 • 29 Readers • 352 pages 4

Threat Modeling: Designing for Security

@Dsero465
Last finished on
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

@Dsero465
Last finished on
The Art of Memory Forensics

The Art of Memory Forensics
ByMichael Hale Ligh,Andrew Case,+2 more
@Dsero465
Last finished on
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

@Dsero465
Last finished on
Secrets & Lies

@Dsero465
Last finished on
Security Engineering

Security Engineering
ByRoss J. Anderson
@Dsero465
Last finished on
Social Engineering: The Science of Human Hacking

@Dsero465
Last finished on
Applied Cryptography: Protocols, Algorithms, and Source Code in C

@Dsero465
Last finished on
Tribe of Hackers

Tribe of Hackers
ByMarcus J. Carey,Jennifer Jin
@Dsero465
Last finished on
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

@Dsero465
Last finished on
Reversing Secrets of Reverse Engineering

@Dsero465
Last finished on
Gaming the Metrics

2 Infrastructures

Gaming the Metrics
ByMario Biagioli(Editor),Alexandra Lippman(Editor)
@Dsero465
Added on

2020 • 1 Reader • 306 pages