books by subject
Computer Security

Intercept: The Secret History of Computers and Spies

The Touch

Hack I.T. - Security Through Penetration Testing

Hacking Exposed Linux

Exploiting Software: How to Break Code

Red Hat Linux Networking and System Administration

Hacking: The Art of Exploitation

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Liberating Cyberspace: Civil Liberties, Human Rights & the Internet

Codes and Cryptography

Codes and Cryptography

PHP Cookbook

Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career

Threat Modeling: Designing for Security

Amazon Web Services in Action

Network Security Tools

Blockchain and the Law: The Rule of Code

Spring in Action

Dark Territory: The Secret History of Cyber War

Introduction to Network Security

Group Policy: Fundamentals, Security, and Troubleshooting

Cybersecurity and Cyberwar: What Everyone Needs to KnowRG

The NSA Report: Liberty and Security in a Changing World

Surveillance Valley: The Secret Military History of the Internet

Privacy is Power: Why and How You Should Take Back Control of Your Data

World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing

Foundations of Security: What Every Programmer Needs to Know

Inside Cyber Warfare: Mapping the Cyber Underworld

Network Warrior
