Details
Rating
Dsero465
Rating
Controls
Scrum For Dummies
Scrum for Dummies
  • Mark C. Layton
  • David Morrow
0-
Getting Your First Job For Dummies
Getting Your First Job For Dummies
  • Bill McCann
55.0
Programming Interviews For Dummies
Programming Interviews For Dummies
  • Eric Butow
  • John Z. Sonmez
0-
Getting an IT Help Desk Job for Dummies
Getting an IT Help Desk Job for Dummies
  • Tyler Regas
55.0
Job Search Letters for Dummies
Job Search Letters for Dummies
  • Joyce Lain Kennedy
0-
C# 7.0 All-in-One For Dummies
C# 7.0 All-in-One For Dummies
  • John Paul Mueller
  • Chuck Sphar
0-
DevOps for Dummies
DevOps for Dummies
  • Sanjeev Sharma
0-
Mindful Being
Personal Branding For Dummies
  • Nataša Pantović
0-
Beginning Programming with Python For Dummies
Beginning Programming with Python For Dummies
  • John Paul Mueller
0-
Everyday Life in Medieval England
Everyday Life in Medieval England
  • Christopher Dyer
0-
The Merchant Class of Medieval London: 1300-1500
The Merchant Class of Medieval London: 1300-1500
  • Sylvia L. Thrupp
0-
We Are Dandy: The Elegant Gentleman around the World
We Are Dandy: The Elegant Gentleman around the World
  • Nathaniel Adams
0-
I Am Dandy: The Return of the Elegant Gentleman
I Am Dandy: The Return of the Elegant Gentleman
  • Rose Callahan
0-
Something Deeply Hidden
Something Deeply Hidden
  • Sean Carroll
3.8-
One Who Walked Alone – Robert E. Howard: The Final Years
One Who Walked Alone – Robert E. Howard: The Final Years
  • Novalyne Price Ellis
0-
A Means to Freedom: The Letters of H. P. Lovecraft and Robert E. Howard, Vol 1: 1930-32
A Means to Freedom: The Letters of H. P. Lovecraft and Robert E. Howard, Vol 1: 1930-32
  • Robert E. Howard
  • H. P. Lovecraft
0-
Hafted Weapons in Medieval and Renaissance Europe: The Evolution of European Staff Weapons Between 1200 and 1650
Hafted Weapons in Medieval and Renaissance Europe: The Evolution of European Staff Weapons Between 1200 and 1650
  • Professor John Waldman
0-
Warfare in the classical world
Warfare in the classical world
  • John Warry
0-
We Have Root: Even More Advice from Schneier on Security
We Have Root: Even More Advice from Schneier on Security
  • Bruce Schneier
0-
Cover 6

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  • Dafydd Stuttard
  • Marcus Pinto
4.75-
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
  • Nick Furneaux
0-
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications
  • Niels Ferguson
  • Bruce Schneier
  • Tadayoshi Kohno
3.5-
Cover 4

The Shellcoder's Handbook

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Jack Koziol
  • Chris Anley
  • John Heasman
0-
Malware Analyst's Cookbook and DVD
Malware Analyst's Cookbook and DVD
  • Michael Ligh
  • Steven Adair
  • Blake Hartstein
  • Matthew Richard
5-
Cybersecurity Blue Team Toolkit
Cybersecurity Blue Team Toolkit
  • Nadean H. Tanner
0-
Wolf of Wessex
Wolf of Wessex
  • Matthew Harffy
4-
Threat Modeling: Designing for Security
Threat Modeling: Designing for Security
  • Adam Shostack
5-
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
  • Bruce Dang
  • Alexandre Gazet
  • Elias Bachaalany
0-
The Art of Memory Forensics
The Art of Memory Forensics
  • Michael Hale Ligh
  • Andrew Case
  • Jamie Levy
  • AAron Walters
4-
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
  • Jessey Bullock
  • Jeff T. Parker
0-
Secrets & Lies
Secrets and Lies: Digital Security in a Networked World
  • Bruce Schneier
4.33-
Security Engineering
Security Engineering
  • Ross J. Anderson
3.67-
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks
  • Wil Allsopp
0-
Social Engineering: The Science of Human Hacking
Social Engineering: The Science of Human Hacking
  • Christopher Hadnagy
4-
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Bruce Schneier
3.75-
Tribe of Hackers
Tribe of Hackers
  • Marcus J. Carey
  • Jennifer Jin
0-
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
  • Marcus J. Carey
  • Jennifer Jin
0-
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
  • Roger A. Grimes
0-
Reversing Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
  • Eldad Eilam
4-
Gaming the Metrics
Gaming the Metrics
    0-