Krav Maga: How to Defend Yourself Against Armed Assault | 0 | - | |
Metasploit: The Penetration Tester's Guide - David Kennedy
- Jim O'Gorman
- Devon Kearns
- Mati Aharoni
| 5 | - | |
Reversing: Secrets of Reverse Engineering | 4 | - | |
| 2.33 | - | |
Tom Clancy's Splinter Cell | 3.29 | - | |
Secrets and Lies: Digital Security in a Networked World | 4.5 | - | |
| 3.8 | 4.0 | |
| 0 | - | |
Tom Clancy's splinter cell | 0 | - | |
| 3.38 | - | |
The Hacker Crackdown: Law and Disorder on the Electronic Frontier | 3.73 | - | |
Reverse Deception: Organized Cyber Threat Counter-Exploitation | 0 | - | |
| 3.4 | - | |
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | 3.88 | - | |
Hacking The Art Of Exploitation | 3.86 | - | |
Stealing the Network: How to Own a Shadow - Johnny Long
- Timothy Mullen
- Ryan Russell
| 5 | - | |
Masters of Deception: The Gang That Ruled Cyberspace - Michelle Slatalla
- Joshua Quittner
| 3.44 | - | |
| 0 | - | |
| 0 | - | |
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell | 4 | - | |
The Politics Book: Big Ideas Simply Explained | 4.5 | - | |
Applied Cryptography: Protocols, Algorithms, and Source Code in C | 4 | - | |
The Ultimate Encyclopedia of Mythology: An A-Z Guide to the Myths and Legends of the Ancient World - Arthur Cotterell
- Rachel Storm
| 4 | - | |
| 3.98 | - | |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 3.31 | - | |
Popular Tales from Norse Mythology | 0 | - | |
American Sniper: The Autobiography of the Most Lethal Sniper in U.S. Military History - Chris Kyle
- Scott McEwen
- Jim DeFelice
| 3.34 | - | |
Norse Mythology: A Guide to the Gods, Heroes, Rituals, and Beliefs | 3.5 | - | |
| 3.54 | - | |
| 3 | - | |
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | 4.18 | - | |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.38 | - | |
| 3.33 | - | |
| 3.96 | - | |
| 4 | - | |
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life | 0 | - | |
| 3.8 | - | |
| 3.38 | - | |
Mirrorshades - William Gibson
- John Shirley
- Paul Di Filippo
- Lewis Shiner
- Tom Maddox
- Pat Cadigan
- Rudy Rucker
- Marc Laidlaw
- James Patrick Kelly
- Greg Bear
| 3.84 | - | |
| 3.81 | - | |