Portrait of a Killer: Jack the Ripper Case Closed
Patricia Cornwell
March Battalion
Sven Hassel
The Adventures of Sherlock Holmes Smithsonian Historical Performances
Sir Arthur Conan Doyle & Alfred Shirley & Smithsonian Collecti Cdrads 5017 (Performer) & John Stanley (Performer)
The Big Bamboo
Tim Dorsey
Serge Storms (8)
Web Application Security: Exploitation and Countermeasures for ...
Andrew Hoffman
Practical Internet of Things Security, Second Edition
Brian Russell & Drew van Duren
Linux Hardening in Hostile Networks: Server Security From TLS ...
Kyle Rankin
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime ...
Kevin Poulsen
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Steal This Computer Book 3: What They Won't Tell You About the ...
Wallace Wang
Confronting Cyber-Bullying: What Schools Need to Know to Control ...
Shaheen Shariff Ph.d.
Cyber (1)
Simple Genius
David Baldacci
Sean King and Michelle Maxwell (3)
Cyber Bullying: Bullying in the Digital Age
Robin M. Kowalski Phd; Susan P. Limber Phd; Patricia W. Agatston ...
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks ...
Ed Skoudis & Tom Liston
Step (1)
Friction
Samantha Hunter
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin D. Mitnick & William L. Simon
Fascination
The Database Hacker's Handbook: Defending Database Servers
David Litchfield & Chris Anley & John Heasman & Bill Grindlay
Virtual Vandals
Tom Clancy & Steve Pieczenik & Diane Duane
Tom Clancy's Net Force Explorers (1)
The Fool's Run
John Sandford
Kidd Novel (1)
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling