books by subject
Computer Security

Linux Systems Programming

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

The .NET Developer's Guide to Windows Security

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Computer Forensics: Incident Response Essentials

Hackers: Heroes of the Computer Revolution

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

BackTrack 5 Cookbook

Metasploit: The Penetration Tester's Guide

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

Cyber Bullying: Bullying in the Digital Age

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

Windows 8 Step by Step

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

E-mail Rules - A Business Guide to Managing Policies, Security, and legal Issues for E-Mail and Digital Communication

Schneier on Security

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

Blockchain: The Insights You Need from Harvard Business Review (HBR Insights Series)

Scooped! – Media Miss Real Story on Crime While Chasing Sex, Sleaze, & Celebrities (The Facets Of Ruby Series)

Make Your Own Web Page

Cybersecurity Blue Team Toolkit

Penetration Testing: A Hands-On Introduction to Hacking

Privacy is Power: Why and How You Should Take Back Control of Your Data

Official (ISC)2 Guide to the CISSP CBK, Third Edition (ISC2 Press)

Architecting Mobile Solutions for the Enterprise

Total Surveillance: Investigating the Big Brother World of E-spies, Eavesdroppers and CCTV

PHP Cookbook: 1

Creating Applications with Mozilla
