Details
Rating
haltandcatchfire
Rating
Controls
Krav Maga: How to Defend Yourself Against Armed Assault
Krav Maga: How to Defend Yourself Against Armed Assault
  • Imi Sde-Or
  • Eyal Yanilov
0-
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
  • David Kennedy
  • Jim O'Gorman
  • Devon Kearns
  • Mati Aharoni
5-
Reversing Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
  • Eldad Eilam
4-
Hacker's Delight
Hacker's Delight
  • Henry S. Warren Jr.
2.33-
Tom Clancy's Splinter Cell
Tom Clancy's Splinter Cell
  • Tom Clancy
3.29-
Secrets & Lies
Secrets and Lies: Digital Security in a Networked World
  • Bruce Schneier
4.5-
DarkMarket
DarkMarket
  • Misha Glenny
3.84.0
Conviction
Conviction
    0-
    Tom Clancy's splinter cell
    Tom Clancy's splinter cell
    • Tom Clancy
    0-
    Splinter Cell
    Splinter Cell
      3.38-
      The Hacker Crackdown: Law and Disorder on the Electronic Frontier
      The Hacker Crackdown: Law and Disorder on the Electronic Frontier
      • Bruce Sterling
      3.73-
      Reverse Deception: Organized Cyber Threat Counter-Exploitation
      Reverse Deception: Organized Cyber Threat Counter-Exploitation
      • Sean M. Bodmer
      • Max Kilger
      0-
      Social Engineering
      Social Engineering
      • Christopher Hadnagy
      3.4-
      Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
      Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
      • Kevin Poulsen
      3.88-
      Hacking The Art Of Exploitation
      Hacking The Art Of Exploitation
      • Jon Erickson
      3.86-
      Stealing the Network: How to Own a Shadow
      Stealing the Network: How to Own a Shadow
      • Johnny Long
      • Timothy Mullen
      • Ryan Russell
      5-
      Masters of Deception: The Gang That Ruled Cyberspace
      Masters of Deception: The Gang That Ruled Cyberspace
      • Michelle Slatalla
      • Joshua Quittner
      3.44-
      Gray hat hacking
      Gray hat hacking
      • Shon Harris
      • Chris Eagle
      0-
      How to be a gentleman
      How to be a gentleman
      • Bridges, John
      0-
      Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
      Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
      • Phil Lapsley
      4-
      The Politics Book
      The Politics Book: Big Ideas Simply Explained
        4.5-
        Applied Cryptography: Protocols, Algorithms, and Source Code in C
        Applied Cryptography: Protocols, Algorithms, and Source Code in C
        • Bruce Schneier
        4-
        The Ultimate Encyclopedia of Mythology: An A-Z Guide to the Myths and Legends of the Ancient World
        The Ultimate Encyclopedia of Mythology: An A-Z Guide to the Myths and Legends of the Ancient World
        • Arthur Cotterell
        • Rachel Storm
        4-
        Ghost in the Wires
        Ghost in the Wires
        • Kevin D. Mitnick
        3.98-
        The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
        The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
        • Kevin D. Mitnick
        • William L. Simon
        3.31-
        Popular Tales from Norse Mythology
        Popular Tales from Norse Mythology
        • George Webbe Dasent
        0-
        American Sniper: The Autobiography of the Most Lethal Sniper in U.S. Military History
        American Sniper: The Autobiography of the Most Lethal Sniper in U.S. Military History
        • Chris Kyle
        • Scott McEwen
        • Jim DeFelice
        3.34-
        Norse Mythology: A Guide to the Gods, Heroes, Rituals, and Beliefs
        Norse Mythology: A Guide to the Gods, Heroes, Rituals, and Beliefs
        • John Lindow
        3.5-
        Argo
        Argo
        • Antonio J. Méndez
        3.54-
        Cyberpunk
        Cyberpunk
        • Bruce Bethke
        3-
        The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
        The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
        • Clifford Stoll
        4.18-
        The Art of Deception
        The Art of Deception
        • Kevin D. Mitnick
        • William L. Simon
        3.38-
        The Master of Disguise
        The Master of Disguise
        • Antonio J. Mendez
        3.33-
        Count Zero
        Biochips
        • William Gibson
        3.96-
        Things Come Apart
        Things Come Apart
        • Todd McLellan
        4-
        How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life
        How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life
        • J.J. Luna
        0-
        Neuromancer
        Neuromancer
        • William Gibson
        3.8-
        Cyberpunk
        Cyberpunk
        • Katie Hafner
        • John Markoff
        3.38-
        Mirrorshades
        Mirrorshades
        • William Gibson
        • John Shirley
        • Paul Di Filippo
        • Lewis Shiner
        • Tom Maddox
        • Pat Cadigan
        • Rudy Rucker
        • Marc Laidlaw
        • James Patrick Kelly
        • Greg Bear
        3.84-
        Burning Chrome
        Burning Chrome
        • William Gibson
        3.81-