#2 of 3 in A Song Called Youth

Eclipse Penumbra
ByJohn Shirley
@haltandcatchfire
Added on

1988 • 3 Readers

The Most Dangerous Game

The Most Dangerous Game
ByRichard Connell
@haltandcatchfire
Added on

1924 • 136 Readers • 41 pages 3.8

Explore Everything: Place-Hacking the City

@haltandcatchfire
Added on

2013 • 4 Readers 3

Practical Malware Analysis

Practical Malware Analysis
ByMichael Sikorski,Andrew Honig
@haltandcatchfire
Added on

2012 • 18 Readers • 802 pages 4.5

@haltandcatchfire
Added on

1989 • 2 Readers • 504 pages

Unauthorised Access: Physical Penetration Testing for IT Security Teams

@haltandcatchfire
Added on

2009 • 4 Readers

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

@haltandcatchfire
Added on

2007 • 4 Readers • 285 pages

Rogue Code

#3 of 5 in Jeff Aiken

Rogue Code
ByMark E. Russinovich
@haltandcatchfire
Added on

2014 • 17 Readers 3.8

Advanced Lock Picking Secrets

@haltandcatchfire
Added on

1989 • 1 Reader • 56 pages

Architectural Graphics

Architectural Graphics
ByFrancis D.K. Ching
@haltandcatchfire
Added on

1974 • 4 Readers • 272 pages

No Easy Day

No Easy Day
ByMark Owen,Kevin Maurer,+2 more
@haltandcatchfire
Last finished on
The web application hacker's handbook

@haltandcatchfire
Added on

2011 • 12 Readers • 912 pages 5

Rootkit arsenal

Rootkit arsenal
ByBill Blunden
@haltandcatchfire
Added on

1 Reader

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age

@haltandcatchfire
Added on

2001 • 26 Readers • 368 pages 3.5

Influx

Influx
ByDaniel Suarez
@haltandcatchfire
Added on

2014 • 122 Readers • 393 pages 3.9

Post-Human Series Volume-1

#1-2 of 5 in Post-Human

@haltandcatchfire
Added on

2013 • 9 Readers • 200 pages 3

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

@haltandcatchfire
Added on

2011 • 8 Readers • 212 pages 4

The Difference Engine

The Difference Engine
ByWilliam Gibson,Bruce Sterling
@haltandcatchfire
Added on

1990 • 164 Readers • 429 pages 3.2

Hacking for dummies

Hacking for dummies
ByKevin Beaver
@haltandcatchfire
Added on

2004 • 3 Readers • 358 pages

Introduction to Security and Applied Cryptography

Introduction to Security and Applied Cryptography
ByBruce Schneier,Michael T. Goodrich,+1 more
@haltandcatchfire
Added on

2006 • 1 Reader

High-Security Mechanical Locks: An Encyclopedic Reference

@haltandcatchfire
Added on

2007 • 1 Reader • 597 pages

Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy

@haltandcatchfire
Added on

1994 • 1 Reader • 188 pages

Architecture

Architecture
ByFrancis D.K. Ching
@haltandcatchfire
Added on

1979 • 17 Readers • 416 pages 5

Practical Lock Picking: A Physical Penetration Tester's Training Guide

@haltandcatchfire
Added on

2010 • 4 Readers • 255 pages 5

A Visual Dictionary of Architecture

@haltandcatchfire
Added on

1995 • 5 Readers • 320 pages 5

Stealing the Network: The Complete Series Collector's Edition, Final Chapter,

4 Stealing the Network

@haltandcatchfire
Added on

2009 • 3 Readers • 1,038 pages 5

How to disappear

How to disappear
ByFrank M. Ahearn
@haltandcatchfire
Added on

2010 • 5 Readers • 204 pages 3

See No Evil

See No Evil
ByRobert B. Baer
@haltandcatchfire
Added on

2002 • 17 Readers • 320 pages 4

Blackstone's Counter-Terrorism Handbook

Blackstone's Counter-Terrorism Handbook
ByAndrew Staniforth,Clive Walker,+1 more
@haltandcatchfire
Added on

2009 • 1 Reader • 722 pages

Counter-Terrorism Equipment

@haltandcatchfire
Added on

1997 • 1 Reader • 144 pages

Better than Human

Better than Human
ByAllen Buchanan
@haltandcatchfire
Last finished on
Advanced windows debugging

Advanced windows debugging
ByDaniel Pravat,Mario Hewardt
@haltandcatchfire
Added on

2007 • 2 Readers • 809 pages

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

@haltandcatchfire
Added on

2006 • 5 Readers

Managed code rootkits

@haltandcatchfire
Added on

1 Reader

Hunting Security Bugs

Hunting Security Bugs
ByTom Gallagher,Bryan Jeffries,+1 more
@haltandcatchfire
Added on

2006 • 2 Readers • 590 pages

@haltandcatchfire
Added on

2009 • 2 Readers 3

Exploiting Software: How to Break Code

Exploiting Software: How to Break Code
ByGreg Hoglund,Gary McGraw
@haltandcatchfire
Added on

2004 • 2 Readers

Open Source Fuzzing Tools

@haltandcatchfire
Added on

2007 • 2 Readers • 199 pages

How to Break Software Security

How to Break Software Security
ByJames A. Whittaker,Hugh Thompson
@haltandcatchfire
Added on

2002 • 2 Readers

@haltandcatchfire
Added on

2004 • 7 Readers • 718 pages