Empire of Storms
Sarah J. Maas
Generation of Vipers
Philip Wylie
SSN
Tom Clancy & Martin Greenberg
The Replacement Child
Christine Barber
Linux Hardening in Hostile Networks: Server Security From TLS ...
Kyle Rankin
Practical Internet of Things Security, Second Edition
Brian Russell & Drew van Duren
Web Application Security: Exploitation and Countermeasures for ...
Andrew Hoffman
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks ...
Ed Skoudis & Tom Liston
Step (1)
Steal This Computer Book 3: What They Won't Tell You About the ...
Wallace Wang
The Fool's Run
John Sandford
Kidd Novel (1)
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling
The Art of Intrusion: The Real Stories Behind the Exploits of ...
Kevin D. Mitnick & William L. Simon
The Database Hacker's Handbook: Defending Database Servers
David Litchfield & Chris Anley & John Heasman & Bill Grindlay
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Fascination
Samantha Hunter
Friction
Confronting Cyber-Bullying: What Schools Need to Know to Control ...
Shaheen Shariff Ph.d.
Cyber (1)
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime ...
Kevin Poulsen
Cyber Bullying: Bullying in the Digital Age
Robin M. Kowalski Phd; Susan P. Limber Phd; Patricia W. Agatston ...
Virtual Vandals
Tom Clancy & Steve Pieczenik & Diane Duane
Tom Clancy's Net Force Explorers (1)
Simple Genius
David Baldacci
Sean King and Michelle Maxwell (3)