Title: American Black Chamber, Author: Herbert O. Yardley
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: Building Blockchain Apps / Edition 1, Author: Michael Yuan
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, Author: Deviant Ollam
Title: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Author: Johnny Long
Title: Police Use of Force: Important Issues Facing the Police and the Communities They Serve / Edition 1, Author: Michael J. Palmiotto
Title: Dissecting the Hack: The V3rb0t3n Network, Author: Jayson E Street
Title: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security / Edition 1, Author: Will Arthur
Title: Crafting the InfoSec Playbook / Edition 1, Author: Jeff Bollinger
Title: Data-Driven Security: Analysis, Visualization and Dashboards / Edition 1, Author: Jay Jacobs
Title: Iron-Clad Java: Building Secure Web Applications / Edition 1, Author: August Detlefsen
Title: Cyber-Physical Attacks: A Growing Invisible Threat, Author: George Loukas PhD
Title: Network Attacks and Exploitation: A Framework / Edition 1, Author: Matthew Monte
Title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails / Edition 1, Author: Christopher Hadnagy
Title: Deploying Secure Containers for Training and Development, Author: Jon Schipp
Title: Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols, Author: Michael T. Raggo
Title: Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1, Author: Joel McNamara

Pagination Links