The Grace of Kings

#1 of 4 in The Dandelion Dynasty

@Dsero465
Last finished on
We Have Root: Even More Advice from Schneier on Security

@Dsero465
Last finished on
Mindful Being

#4 of 2 in AoL Mindfulness

@Dsero465
Last finished on
C# 7.0 All-in-One For Dummies

C# 7.0 All-in-One For Dummies
ByJohn Paul Mueller,Chuck Sphar
@Dsero465
Last finished on
Job Search Letters for Dummies

Job Search Letters for Dummies
ByJoyce Lain Kennedy
@Dsero465
Last finished on
Scrum For Dummies

Scrum for Dummies
ByMark C. Layton,David Morrow
@Dsero465
Last finished on
Programming Interviews For Dummies

Programming Interviews For Dummies
ByEric Butow,John Z. Sonmez
@Dsero465
Last finished on
Beginning Programming with Python For Dummies

@Dsero465
Last finished on
SQL for Dummies

SQL for dummies
ByAllen G. Taylor
@Dsero465
Last finished on
LinkedIn for dummies

@Dsero465
Last finished on
Linux All-in-One For Dummies

@Dsero465
Last finished on
Cryptography Engineering: Design Principles and Practical Applications

@Dsero465
Last finished on
Successful time management for dummies

@Dsero465
Last finished on
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

@Dsero465
Last finished on
Tribe of Hackers

Tribe of Hackers
ByMarcus J. Carey,Jennifer Jin
@Dsero465
Last finished on
Social Engineering: The Science of Human Hacking

@Dsero465
Last finished on
Applied Cryptography: Protocols, Algorithms, and Source Code in C

@Dsero465
Last finished on
Security Engineering

Security Engineering
ByRoss J. Anderson
@Dsero465
Last finished on
Secrets & Lies

@Dsero465
Last finished on
Job Interviews For Dummies

Job Interviews For Dummies
ByJoyce Lain Kennedy
@Dsero465
Last finished on
Coding with JavaScript For Dummies

Coding with JavaScript For Dummies
ByChris Minnick,Eva Rose Holland
@Dsero465
Last finished on
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

@Dsero465
Last finished on
The Art of Memory Forensics

The Art of Memory Forensics
ByMichael Hale Ligh,Andrew Case,+2 more
@Dsero465
Last finished on
Threat Modeling: Designing for Security

@Dsero465
Last finished on
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

@Dsero465
Last finished on
GitHub for Dummies

GitHub for Dummies
BySarah Guthals,Phil Haack
@Dsero465
Last finished on
Cybersecurity Blue Team Toolkit

@Dsero465
Last finished on
Job searching with social media for dummies

@Dsero465
Last finished on
Malware Analyst's Cookbook and DVD

Malware Analyst's Cookbook and DVD
ByMichael Ligh,Steven Adair,+2 more
@Dsero465
Last finished on
Reversing Secrets of Reverse Engineering

@Dsero465
Last finished on
Getting an IT Help Desk Job for Dummies

@Dsero465
Last finished on
DevOps for Dummies

DevOps for Dummies
BySanjeev Sharma
@Dsero465
Last finished on
The Name of the Wind

#1 of 3 in The Kingkiller Chronicle

The Name of the Wind
ByPatrick Rothfuss
@Dsero465
Last finished on
A Veil of Spears

#3 of 6 in The Song of the Shattered Sands

A Veil of Spears
ByBradley P. Beaulieu
@Dsero465
Last finished on