| 0 | - | |
| 3.75 | - | |
Explore Everything: Place-Hacking the City | 3 | - | |
Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 4.5 | - | |
| 0 | - | |
Unauthorised Access: Physical Penetration Testing for IT Security Teams | 0 | - | |
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing | 0 | - | |
| 3.82 | - | |
Advanced Lock Picking Secrets | 0 | - | |
| 0 | - | |
No Easy Day - Mark Owen
- Kevin Maurer
- Sara Crimi (Translator)
- Laura Tasso (Translator)
| 3.87 | - | |
The web application hacker's handbook | 5 | - | |
| 0 | - | |
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age | 3.5 | - | |
| 3.89 | - | |
Post-Human Series Volume-1 | 3 | - | |
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security | 4 | - | |
The Difference Engine - William Gibson
- Bruce Sterling
| 3.16 | - | |
| 0 | - | |
Introduction to Security and Applied Cryptography - Bruce Schneier
- Michael T. Goodrich
- Roberto Tamassia
| 0 | - | |
High-Security Mechanical Locks: An Encyclopedic Reference | 0 | - | |
Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy | 0 | - | |
| 5 | - | |
Practical Lock Picking: A Physical Penetration Tester's Training Guide | 5 | - | |
A Visual Dictionary of Architecture | 5 | - | |
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, - Ryan Russell
- Timothy Mullen
| 5 | - | |
| 3 | - | |
| 4 | - | |
Blackstone's Counter-Terrorism Handbook - Andrew Staniforth
- Clive Walker
- Stuart Osborne
| 0 | - | |
Counter-Terrorism Equipment | 0 | - | |
| 4 | - | |
Advanced windows debugging - Daniel Pravat
- Mario Hewardt
| 0 | - | |
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities - Mark Dowd
- John McDonald
- Justin Schuh
| 0 | - | |
| 0 | - | |
Hunting Security Bugs - Tom Gallagher
- Bryan Jeffries
- Lawrence Landauer
| 0 | - | |
| 3 | - | |
Exploiting Software: How to Break Code | 0 | - | |
Open Source Fuzzing Tools | 0 | - | |
How to Break Software Security - James A. Whittaker
- Hugh Thompson
| 0 | - | |
 The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes - Jack Koziol
- Chris Anley
- John Heasman
| 0 | - | |