Details
Rating
haltandcatchfire
Rating
Controls
Cover 5

Eclipse Penumbra

Eclipse Penumbra
  • John Shirley
0-
The Most Dangerous Game
The Most Dangerous Game
  • Richard Connell
3.75-
Explore Everything: Place-Hacking the City
Explore Everything: Place-Hacking the City
  • Bradley L. Garrett
3-
Practical Malware Analysis
Practical Malware Analysis
  • Michael Sikorski
  • Andrew Honig
4.5-
Cover 7

Roman Aqueducts and Water Supply

Roman Aqueducts and Water Supply
  • A. Trevor Hodge
0-
Unauthorised Access: Physical Penetration Testing for IT Security Teams
Unauthorised Access: Physical Penetration Testing for IT Security Teams
  • Wil Allsopp
0-
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • Johnny Long
0-
Rogue Code
Rogue Code
  • Mark E. Russinovich
3.82-
Advanced Lock Picking Secrets
Advanced Lock Picking Secrets
  • Steven Hampton
0-
Architectural Graphics
Architectural Graphics
  • Francis D.K. Ching
0-
No Easy Day
No Easy Day
  • Mark Owen
  • Kevin Maurer
  • Sara Crimi (Translator)
  • Laura Tasso (Translator)
3.87-
The web application hacker's handbook
The web application hacker's handbook
  • Dafydd Stuttard
5-
Rootkit arsenal
Rootkit arsenal
  • Bill Blunden
0-
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
  • Steven Levy
3.5-
Influx
Influx
  • Daniel Suarez
3.89-
Post-Human Series Volume-1
Post-Human Series Volume-1
  • David Simpson
3-
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Tobias Klein
4-
The Difference Engine
The Difference Engine
  • William Gibson
  • Bruce Sterling
3.16-
Hacking for dummies
Hacking for dummies
  • Kevin Beaver
0-
Introduction to Security and Applied Cryptography
Introduction to Security and Applied Cryptography
  • Bruce Schneier
  • Michael T. Goodrich
  • Roberto Tamassia
0-
High-Security Mechanical Locks: An Encyclopedic Reference
High-Security Mechanical Locks: An Encyclopedic Reference
  • Graham Pulford
0-
Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy
Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy
  • ACM IV Security Services
0-
Architecture
Architecture
  • Francis D.K. Ching
5-
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
  • Deviant Ollam
5-
A Visual Dictionary of Architecture
A Visual Dictionary of Architecture
  • Francis D.K. Ching
5-
Stealing the Network: The Complete Series Collector's Edition, Final Chapter,
Stealing the Network: The Complete Series Collector's Edition, Final Chapter,
  • Ryan Russell
  • Timothy Mullen
5-
How to disappear
How to disappear
  • Frank M. Ahearn
3-
See No Evil
See No Evil
  • Robert B. Baer
4-
Blackstone's Counter-Terrorism Handbook
Blackstone's Counter-Terrorism Handbook
  • Andrew Staniforth
  • Clive Walker
  • Stuart Osborne
0-
Counter-Terrorism Equipment
Counter-Terrorism Equipment
  • Ian V. Hogg
0-
Better than Human
Better than Human
  • Allen Buchanan
4-
Advanced windows debugging
Advanced windows debugging
  • Daniel Pravat
  • Mario Hewardt
0-
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
  • Mark Dowd
  • John McDonald
  • Justin Schuh
0-
Managed code rootkits
Managed code rootkits
  • Erez Metula
0-
Hunting Security Bugs
Hunting Security Bugs
  • Tom Gallagher
  • Bryan Jeffries
  • Lawrence Landauer
0-
Cover 5

SQL Injection Attacks and Defense

SQL Injection Attacks and Defense
  • Justin Clarke-Salt
3-
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
  • Greg Hoglund
  • Gary McGraw
0-
Open Source Fuzzing Tools
Open Source Fuzzing Tools
  • Noam Rathaus
0-
How to Break Software Security
How to Break Software Security
  • James A. Whittaker
  • Hugh Thompson
0-
Cover 4

The Shellcoder's Handbook

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Jack Koziol
  • Chris Anley
  • John Heasman
0-