Hardcover
Year in Books
FeedRecent activity by friends
Trending booksMost popular right now
New ReleasesMost anticipated
RecommendationsJust for you
Archive & Labs
2023 Year in Books The hits
PromptsVote for your favorites
ListsCurated by our readers
GenresBrowse by Genre
MoodsBrowse by Mood
2024 Year in BooksHIghlights from the Year
Year in Books
Dsero465

Dominic

181 Reads
@Dsero465BooksStatsReviewsListsPromptsGoalsNetworkActivity
AllWant to ReadCurrently ReadingReadDid Not Finish
Shelf
Scrum For Dummies
Getting Your First Job For Dummies
Programming Interviews For Dummies
Getting an IT Help Desk Job for Dummies
Job Search Letters for Dummies
C# 7.0 All-in-One For Dummies
DevOps for Dummies
Mindful Being
Beginning Programming with Python For Dummies
Everyday Life in Medieval England
The Merchant Class of Medieval London: 1300-1500
We Are Dandy: The Elegant Gentleman around the World
I Am Dandy: The Return of the Elegant Gentleman
Something Deeply Hidden
One Who Walked Alone – Robert E. Howard: The Final Years
A Means to Freedom: The Letters of H. P. Lovecraft and Robert E. Howard, Vol 1: 1930-32
Hafted Weapons in Medieval and Renaissance Europe: The Evolution of European Staff Weapons Between 1200 and 1650
Warfare in the classical world
We Have Root: Even More Advice from Schneier on Security
Cover 6

The Web Application Hacker's Handbook

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Cryptography Engineering: Design Principles and Practical Applications
Cover 4

The Shellcoder's Handbook

Malware Analyst's Cookbook and DVD
Cybersecurity Blue Team Toolkit
Wolf of Wessex
Threat Modeling: Designing for Security
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
The Art of Memory Forensics
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Secrets & Lies
Security Engineering
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Social Engineering: The Science of Human Hacking
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Tribe of Hackers
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
Reversing Secrets of Reverse Engineering
Gaming the Metrics
PreviousNext

Footer links

Community

Readers & Supporters
Join Our DiscordHow to link roles on Discord

Follow Along

BlogHardcover LiveAbout HardcoverRequest a feature

We're an Open Book

Frequently Asked QuestionsContact SupportRoadmapOur Policies
iOSAndroidDiscordTikTokMastodonInstagram

Home

Library

Explore

Trending