books by subject
Computer Security
![](https://m.media-amazon.com/images/I/51Y963AN6HL._SL500_.jpg)
Running Linux
![](https://m.media-amazon.com/images/I/41GDGTDWMSL._SL500_.jpg)
Virtual Private Networks: Technologies and Solutions (Addison-Wesley Professional Computing Series)
![](https://m.media-amazon.com/images/I/519Z7TJ06VL._SL500_.jpg)
Data Communications and Computer Networks: For Computer Scientists and Engineers
![](https://m.media-amazon.com/images/I/41Z22BTR90L._SL500_.jpg)
Internet and Wireless Security (Telecommunications)
![](https://m.media-amazon.com/images/I/51s2wSGGtIL._SL500_.jpg)
Kali Linux Wireless Penetration Testing: Beginner's Guide
![](https://m.media-amazon.com/images/I/514rc6B7LGL._SL500_.jpg)
Codes: An Introduction to Information Communication and Cryptography
![](https://m.media-amazon.com/images/I/51f+qTtm92L._SL500_.jpg)
Building Robots With Lego Mindstorms
![](https://m.media-amazon.com/images/I/51m5W-NCMGL._SL500_.jpg)
Parent Alert How To Keep Your Kids Safe Online
![](https://m.media-amazon.com/images/I/41pi70WfVzL._SL500_.jpg)
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
![](https://m.media-amazon.com/images/I/61yNz78OfmL._SL500_.jpg)
Network Security: Private Communication in a Public World
![](https://m.media-amazon.com/images/I/51NzqJ88IsL._SL500_.jpg)
Cybercrime: Investigating High-Technology Computer Crime
![](https://m.media-amazon.com/images/I/41KOxJKNrgL._SL500_.jpg)
Cybercrime: The Transformation of Crime in the Information Age
![](https://m.media-amazon.com/images/I/511eIWdmx7L._SL500_.jpg)
The Lazarus Heist: Based on the No 1 Hit podcast
![](https://m.media-amazon.com/images/I/41Fd7jbrj0L._SL500_.jpg)
There's a War Going On But No One Can See It
![](https://m.media-amazon.com/images/I/31D8XI4CW+L._SL500_.jpg)
Deep Fakes and the Infocalypse: What You Urgently Need To Know
![](https://m.media-amazon.com/images/I/510f+rEWzBL._SL500_.jpg)
Cybersecurity and Cyberwar: What Everyone Needs to KnowRG
![](https://m.media-amazon.com/images/I/41Rndn5sM3L._SL500_.jpg)
The NSA Report: Liberty and Security in a Changing World
![](https://m.media-amazon.com/images/I/41lt5IekBKL._SL500_.jpg)
Surveillance Valley: The Secret Military History of the Internet
![](https://m.media-amazon.com/images/I/414RH2OzrmL._SL500_.jpg)
Privacy is Power: Why and How You Should Take Back Control of Your Data
![](https://m.media-amazon.com/images/I/41fRmIEeR8L._SL500_.jpg)
World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing
![](https://m.media-amazon.com/images/I/51s7Pz5+qNL._SL500_.jpg)
Foundations of Security: What Every Programmer Needs to Know
![](https://m.media-amazon.com/images/I/51Xw8boW1xL._SL500_.jpg)
Group Policy: Fundamentals, Security, and Troubleshooting
![](https://m.media-amazon.com/images/I/510wLODGrhL._SL500_.jpg)
Security in Computing
![](https://m.media-amazon.com/images/I/511+T+74AaL._SL500_.jpg)
Hacking
![](https://m.media-amazon.com/images/I/514qhfg3RNL._SL500_.jpg)
Inside Cyber Warfare: Mapping the Cyber Underworld
![](https://m.media-amazon.com/images/I/511sX7eSzWL._SL500_.jpg)
Network Security For Dummies
![](https://m.media-amazon.com/images/I/51FrZ5Yt1eL._SL500_.jpg)
Network Warrior
![](https://m.media-amazon.com/images/I/614xwfIg1DL._SL500_.jpg)
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
![](https://m.media-amazon.com/images/I/41EZ5EueCdL._SL500_.jpg)
Introduction to Network Security
![](https://m.media-amazon.com/images/I/41xWU1eYLAL._SL500_.jpg)