Scrum for Dummies - Mark C. Layton
- David Morrow
| 0 | - | |
Getting Your First Job For Dummies | 5 | 5.0 | |
Programming Interviews For Dummies | 0 | - | |
Getting an IT Help Desk Job for Dummies | 5 | 5.0 | |
Job Search Letters for Dummies | 0 | - | |
C# 7.0 All-in-One For Dummies - John Paul Mueller
- Chuck Sphar
| 0 | - | |
| 0 | - | |
Personal Branding For Dummies | 0 | - | |
Beginning Programming with Python For Dummies | 0 | - | |
Everyday Life in Medieval England | 0 | - | |
The Merchant Class of Medieval London: 1300-1500 | 0 | - | |
We Are Dandy: The Elegant Gentleman around the World | 0 | - | |
I Am Dandy: The Return of the Elegant Gentleman | 0 | - | |
| 3.8 | - | |
One Who Walked Alone – Robert E. Howard: The Final Years | 0 | - | |
A Means to Freedom: The Letters of H. P. Lovecraft and Robert E. Howard, Vol 1: 1930-32 - Robert E. Howard
- H. P. Lovecraft
| 0 | - | |
Hafted Weapons in Medieval and Renaissance Europe: The Evolution of European Staff Weapons Between 1200 and 1650 | 0 | - | |
Warfare in the classical world | 0 | - | |
We Have Root: Even More Advice from Schneier on Security | 0 | - | |
| 4.75 | - | |
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence | 0 | - | |
Cryptography Engineering: Design Principles and Practical Applications - Niels Ferguson
- Bruce Schneier
- Tadayoshi Kohno
| 3.5 | - | |
 The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes - Jack Koziol
- Chris Anley
- John Heasman
| 0 | - | |
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 5 | - | |
Cybersecurity Blue Team Toolkit | 0 | - | |
| 4 | - | |
Threat Modeling: Designing for Security | 5 | - | |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation - Bruce Dang
- Alexandre Gazet
- Elias Bachaalany
| 0 | - | |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 | - | |
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework - Jessey Bullock
- Jeff T. Parker
| 0 | - | |
Secrets and Lies: Digital Security in a Networked World | 4.33 | - | |
| 3.67 | - | |
Advanced Penetration Testing: Hacking the World's Most Secure Networks | 0 | - | |
Social Engineering: The Science of Human Hacking | 4 | - | |
Applied Cryptography: Protocols, Algorithms, and Source Code in C | 3.75 | - | |
Tribe of Hackers - Marcus J. Carey
- Jennifer Jin
| 0 | - | |
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity - Marcus J. Carey
- Jennifer Jin
| 0 | - | |
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto | 0 | - | |
Reversing: Secrets of Reverse Engineering | 4 | - | |
| 0 | - | |