Binary Image
book collection (632 Records)(ISC)2 Certified Cloud Security Professional CCSP (digital)
12-Hour MBA Program, The
1776
1984
97 Things Every Information Security Professional Should Know
@War
A Monetary History Of The United States, 1857-1960
A Practical Guide to Digital Forensics Investigations
A Sense of Urgency
A Tract on Monetary Reform
Absolute FreeBSD
Absolute FreeBSD Second Edition
Absolute OpenBSD
Accidental Theorist, The
Advantage, The
Agile Application Security
Alexander Hamilton
American Constitutional Law: Introductory Essays and Selected Cases Thirteenth Edition
American Gun: A History of the U.S. in Ten Firearms
American Satire
American Theocracy
An Unfinished Life: John F. Kennedy 1917-1963
Angular Up & Running (digital)
Apache Security
Applied Cryptography (digital)
Art of Agile Development, The
Art of Attack, The (digital)
Art of Deception, The
Art of Deception, The (digital)
Art of Intrusion, The (digital)
Art of Memory Forensics, The (digital)
Art of Reasoning, The
Auditing & Assurance Services: A Systematic Approach Fourth Edition
Automate the Boring Stuff with Python
Automate the Boring Stuff with Python (digital)
AWS Certified Advanced Networking Official Study Guide
AWS Certified AdvanceSysOps Administrator Study Guide
AWS Certified Cloud Practitioner (digital)
AWS Certified Data Analyst (digital)
AWS Certified Secuity-Specialty Exam guide (digital)
AWS Certified Security - Specialty Exam Guide
AWS Certified Solutions Architect (digital)
AWS Certified SysOps Administrator (digital)
AWS Penetration Testing (digital)
Azure Security (digital)
Backup & Recovery
Balanced Scorecard
Bash Cookbook 2nd Edition
Bash Cookbook 2nd Edition (digital)
Basic Writings of Kant
Basic Writings of Nietzsche
Basics, The : A Rhetoric and Handbook
Be Here Now
Behind Deep Blue
Being Lucky
Beyond Coincidence
Beyond Fear
Beyond Reengineering
Black Hat Python
Black Hat Python (digital)
Blink: The Power of Thinking Without Thinking
Blown to Bits
Body of Secrets
Book of Kubernetes, The
Book of PF, The
BSD Hacks
BSD UNIX Toolbox
Buddhist Boot Camp
Building a Career in Cybersecurity
Building Event-Driven Microservices
Building Evolutionary Architectures
Building Internet Firewalls
Building Micro-Frontends
Built To Last
Bulletproof SSL and TLS
Bureau, The
Burn Before Reading
Business Adventures: Tweleve Classic Tales from the World of Wall Street
Business Law and the Regulatory Environment
Call Sign Chaos: Learning to Lead
Capitalism and Freedom
Career Planning Today
Carly Fiorina | Tough Choices
Carolyn 101
CCENT ICND1 Study Guide 3rd Edition
CCNA Certification Practice Tests (digital)
CCNA Certification Study Guide (digital)
CCNA Complete Study Guide 2nd Edition
CCNA Enterprise Certification Study Guide (digital)
Chances Are
Circle Of Innovation, The
CISA - Certified Information Systems Auditor Study Guide (digital)
CISM Review Manual 2007
CISSP Certification Exam Guide Second Edition
CISSP Exam Guide Fifth Edition
CISSP Exam Guide Fourth Edition
CISSP Exam Guide Sixth Edition
CISSP Exam Guide Third Edition
CISSP Fifth Edition
CISSP Practice Exams
CISSP Practice Exams Second Edition
Class 11: Inside the CIA's First Post-9/11 Spy Class
Classic Shell Scripting
Click Here to Kill Everybody (Kindle)
Code
Code Book, The
Common Sense Econcomics
Communist Manifesto, The
Competitive Leadership
Competitive Strategy: Techniques for analyzing industries and competitors
Complete Works of William Shakespeare, The
CompTIA A+ Complete Review Guide 4th Edition
CompTIA Cloud Essentials+ Study Guide (digital)
CompTIA CySA+ Study Guide
CompTIA Linux+ Study Guide (digital)
CompTIA Network+ Review Guide 4th Edition
CompTIA PenTest+ Practice Tests (digital)
CompTIA Security +
CompTIA Security+ Review Guide 4th Edition
CompTIA Security+ SY0-701 Cert Guide
CompTIA Security+: SY0-601 Certification Guide Second Edition (digital)
Compuer Forensics (digital)
Computer Desktop Encyclopedia
Computing Concepts Java Essentials Third Edition
Concurrency in C# Cookbook 2nd Edition (digital)
Confessions of an Economic Hitman
Continuous API Management
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Cracking Code with Python (digital)
Cryptography Apocalypse (digital)
Cryptography Engineering (digital)
CSS Pocket Reference (digital)
CSS: the Definitive Guide (digital)
Cuckoo's Egg, The: Tracking A Spy Through The Maze Of Computer Espionage
Cyber Law
Cyber Minds (digital)
Cyber Warfare
Cyberpunk: Outlaws and Hackers on the Computer Frontier
Cybersecurity & Third Party Risk (digital)
Cybersecurity - Attack and Defense Strategies
Cybersecurity and Cyberwar
Cybersecurity Attacks - Red Team Strategies (digital)
Cybersecurity Blue Team Toolkit (digital)
Cybersecurity for Small Networks
Cybersecurity Manager's Guide, The
Cybersecurity Myths and Misconceptions
Cybersecurity Myths and Misconceptions
Cybersecurity Ops with bash (digital)
Cybersecurity Threats, Malware Trends, and Strategies (digital)
Data and Goliath (Kindle)
Data Breaches: Crisis and Opportuniy
Data Visualization with Python & JavaScript (digital)
Database and Application Security
Database Nation
Database Reliability Engineering (digital)
David Rockefeller Memoirs
Death of Competition, The
Deep Learning Cookbook (digital)
Defensive Security Handbook
Delivering on the promise
Democratic Debate, The
Design of Business, The
Designing and Developing Secure Azure Solutions
Designing Secure Software: A Guide for Developers
Designing Web APIs (digital)
Devops for the Desperate
DevOps Handbook
DevOps Handbook, The Second Edition (Kindle)
Die Empty
Digital Forensics and Incident Response (digital)
Dilbert Future, The
Dilbert Principle, The
Dissecting the Hack
Distributed Systems with Node.js (digital)
Distributed Tracing in Practice (digital)
Docker Cookbook (digital)
Does IT Matter?
dot.con
Dr. Deming: The American Who Taught the Japanese about Quality
Dreaming in Code
Drive: the surprising truth about what motivates us
Duty: Memoirs of a Secretary at War
Dynamic ReTeaming (digital)
Easy Writer
Edward Teller
Effective awk Programming 4th Edition
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Elegant SciPy (digital)
Eloquent JavaScript
End of Detroit, The
End of Illness, The
End of Power, The
Energy: A Beginner's Guide
Escape from Lecumberri
Essential Drucker, The
Essentials of Public Speaking
Even Cowgirls get the Blues
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2
Execution
Faster
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Federalist Papers, The
Fierce Invalids Home From Hot Climates
File System Forensic Analysis
Firewalls
First-Time Manager, The
Five Dysfunctions of a Team, The
Five Minds for the Future
Five Tempations of a CEO, The
Flask Web Development (digital)
Flow Architectures
For Common Things
Four Obsessions of an Extraordinary Executive, The
Four, The: The Hidden DNA of Amazon, Apple, Facebook, and Google
Freakonomics
FreeBSD 6 Unleashed
Freefall of the American University
Fundamentals of Scalable Systems
Fundamentals of Software Architecture
Fuzzy Logic
Game Hacking
Game Theory, The
GCP Associate Cloud Engineer Study Guide
GCP Data Engineer Study Guide (digital)
Geekonomics
Generally Speaking
Generation Debt
Getting Things Done: The Art of Stress-Free Productivity
Getting Things Done: The Art of Stress-Free Productivity (2015)
Ghidra Software Reverse Engineering for Beginners (digital)
Give and Take: Why Helping Others Drives Our Success
GNU Emacs 3rd Edition
Goal, The: A Process of Ongoing Improvement
Good Debt, Bad Debt
Good To Great
Google Hacks
Gray Hat Python (digital)
Great by Choice
Grep Pocket Reference
Hack the Stack with Snort and Ethereal
Hacker Crackdown: Law and Disorder On The Electronic Frontier
Hackers: Heroes of the Computer Revolution
Hacking Exposed Linux 3rd Edition
Hacking Exposed Web Applications
Hacking Exposed Windows 3rd Edition
Hacking Exposed Wireless, 3rd edition
Hacking Exposed: Network Security Secrets and Solutions, Second Edition
Hacking Multifactor Authentication (digital)
Hacking: the art of exploitation, 2nd edition
Half Asleep in Frog Pajamas
Hands-On Unsupervised Learning Using Python (digital)
Harvard Business Review on Becoming a High-Performance Manager
HBR 10 Must Read 2017
HBR 2016 Definitive Management Ideas of the Year
HBR Change Management
HBR Emotional Intelligence
HBR Leadership
HBR Managing People
HBR Managing Yourself
HBR Strategy
HBR The Essentials
High Performance Python (digital)
Hitchhiker's Guide to Python, The (digital)
Hot, Flat,and Crowded
How Linux Works
How The Mighty Fall
How to be a star at work
How to Win Friends and Influence People
How will you measure your life?
Icarus Syndrome, The
Idea Brokers, The : Think Tanks and the Rise of the New Policy Elite
Impractical Python Projects (digital)
In an Uncertain World
In Code: A Mathematical Journey
In Defense of Food: an eater's manifesto
In Zero Trust We Trust
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Third Edition
Indiana University: Volume I: The Early Years
Indiana University: Volume II: In Mid-Passage
Infinite In All Directions
Informant, The
Information Privacy Engineering and Privacy by Design
Inmates are Running the Asylum, The
Innovator's Dilemma, The
Intelligence-Driven Incident Response
Intelligent Investor, The
Introducing Python (digital)
Introducing Regular Expressions
Invent Your Own Computer Game with Python (digital)
Investigating Cryptocurrencies (digital)
Iron-Clad Java: Building Secure Web Applications
Isaac Newton
IT Governance
It's Our Ship
It's Your Ship
J. Robert Oppenheimer
Jack: Straight from the Gut
Java Concepts Fourth Edition
Java Cookbook 4th Edition (digital)
Java: An Introduction to Computer Science and Programming Third Edition
JavaScript Cookbook 3rd Edition (digital)
Jenkins 2 Up & Running (digital)
Jitterbug Perfume
John Maynard Keynes: Fighting for Freedom, 1937-1946
Kali Linux Penetration Testing Bible (digital)
Kant
Kennedy Men, The: 1901-1963
Kotlin Cookbook (digital)
Kubernetes Best Practices (digital)
Kubernetes Operators (digital)
Language of Literature, The
Last Season, The
Laws of UX (digital)
Leader of the Future, The
Leading the Transformation: Applying Agile and DevOps Principles at Scale
Lean Enterprise: How High Performance Organizations Innovate at Scale
Lean Six Sigma Pocket Toolbook, The
Lean Startup, The
Learn Computer Forensics
Learn Kali Linux (digital)
Learn Kali Linux 2019
Learn Kubernetes Security (digital)
Learn Wireshark (digital)
Learning Apache OpenWhisk (digital)
Learning Domain-Driven Design
Learning GraphQL (digital)
Learning Helm (digital)
Learning JavaScript (digital)
Learning Kali Linux (digital)
Learning MySQL
Learning PHP, MySQL, & JavaScript (digital)
Learning React (digital)
Learning the Bash Shell 3rd Edition
Lexus and the Olive Branch, The
Liars and Outliers (digital)
Liars and Outliers: Enabling the trust that Society needs to thrive
Liberation Management
Linux Command Line, The
Linux Device Drivers 3rd Edition
Linux Essential Reference
Linux Firewalls
Linux Firewalls
Linux In A Nutshell 6th Edition
Linux Pocket Guide 3rd Edition
Linux Security Cookbook
Linux Server Hacks
Linux Server Hacks
Linux Server Hacks Volume Two
Linux System Programming 2nd Edition
Literature: The English Tradition
Little Bets: How Breakthrough Ideas Emerge from Small Discoveries
Living the Martial Way: A Manual for the Way a Modern Warrrior Should Think, The
Logic of Life, The
Long Tail, The
Longitudes & Attitudes
Louis V. Gerstner: Who Says Elephants Can't Dance?
LPI Linux Essentials Study Guide (digital)
LPIC-1 Linux Professional Institute Certification (digital)
Mac OS X UNIX Toolbox
Machine Learning Python Pocket Reference (digital)
Machine Learning with Python Cookbook (digital)
Made to Stick
Making Harvard Modern
Making It All Work: Winning at the Game of Work and Business
Making Smart Decisions
Making Work Visible: Exposing Time Theft to Optimize Work & Flow
Malware Analyst's Cookbook (digital)
Manage it: Your guide to mondern, pragmatic, project management
Management Tips: from Harvard Business Review
Mao: The Unknown Story
Mastering API Architecture
Mastering Azure Security
Mastering FreeBSD and OpenBSD Security
Mastering Linux Security and Hardening (digital)
Mastering Malware Analysis (digital)
Mastering Modular JavaScript (digital)
Mastering Python for Network and Security (digital)
Mastering Regular Expressions 2nd Edition
Mastering Regular Expressions 3rd Edition
Mastering Windows Security and Hardening (digital)
Math adventure with Python (digital)
MBA Oath, The
MCA Microsoft 365 Certified Associate (digital)
MCA Microsoft 365 Certified Associate Exam-MD-101 (digital)
MCA Modern Desktop Administrator Practice Tests (digital)
McKinsey Mind, The
McKinsey Way, The
McKinsey's Marvin Bower: Vision, Leadership, and the Creation of Management Consulting
MCSA Windows Server 2016 Practice Tests
MCSA Windows Server 2016 Study Guide 70-740
MCSA Windows Server 2016 Study Guide 70-741
MCSA Windows Server 2016 Study Guide 70-742
Meaning of it all, The
Memnoch the Devil
Men are from Mars, Women are from Venus
Metasploit 5.0 for Beginners (digital)
Metasploit The Penetration Testers's Guide
Microservices Up & Running
Microsoft 365 Security Administration: MS-500 Exam Guide (digital)
Microsoft Azure Network Security
Microsoft Defender for Cloud
Microsoft Exam 70-462: Administering SQL Server 2012 Databases Training Kit
Microsoft Internet Information Services 5.0
Microsoft Sentinel
Microsoft Windows Internals 6th Edition Part 1: Covering Windows Server 2008r2 and Windows 7
Migrating to AWS: A Manager's Guide (digital)
Military Methods of the Art of War
Mission Python (digital)
Mistakes Were Made (but Not by Me) (Kindle)
Modern Data Protection
Modern Security Operations Center, The
ModSecurity Handbook 2nd Edition
Monolith to Microservices
My FBI
My Life
MySQL Cookbook
MySQL Crash Course
MySQL in a nutshell
Mythical Man-Month, The
Naked Economics: Undressing the Dismal Science
Natural Language Processing with Python (digital)
Natural World, The
Navy SEAL Sniper: An Intimate Look at the Sniper of the 21st Century
NeoCon Reader, The
Network Flow Analysis
Network Maintenance and Troubleshooting Guide
Network Programming with Go
Network Security Assessment
Network Security Hacks
Network Security: Private Communication in a Public World
Network Warrior
Networking Essentials Plus Third Edition
New Leader's 100-day action plan: how to take charge, build your team, and get immediate results
Nietzsche
NMAP Cookbook: The Fat-Free Guide to Network Scanning
NMAP Network Scanning
No A**hole Rule, The
NoSQL Distilled
Official (ISC)2 Guide to the CISSP CBK
Omnivore's Dilemma, The: a natural history of four meals
Open-Source Web, The
Oracle Certified Associate Exam 170-808
Oracle Certified Professional Exam 170-809
Oracle Certified Professional Java SE 11 Programmer (digital)
Oracle Certified Professional Java SE 11 Programmer I (digital)
Oracle Essentials: Oracle Database 10g
Oracle Essentials: Oracle Database 12c 5th Edition
Out of the Crisis (Kindle)
Overcoming the Five Dysfunctions of a Team
Patrolling Cyberspace
Pattern Recognition
Pentester Blueprint, The (digital)
Pentesting Azure Applications
Personal MBA, The: Master the art of business
pfSense: The Definitive Guide
Philosophy: the quest for truth
Phoenix Project (Kindle)
Phoenix Project, The: A novel about IT, DevOps, and helping your business win
Pit of Success, The (Kindle)
Plato
PMP Practice Tests (digital)
PMP Study Guide (digital)
Postbaccalaureate Futures
Power of Habit, The: Why we do what we do in life and business
Power of Six Sigma, The
Power of the Other, The (Kindle)
PowerShell Cookbook 4th Edition (digital)
Powershell for Sysadmins
Practical Cloud Native Security with Falco
Practical Cryptography
Practical Data Privacy
Practical Hardware Pentesting (digital)
Practical Linux Forensics
Practical Malware Analysis
Practical Mobile Forensics (digital)
Practical Reverse Engineering (digital)
Practical SQL
Practical TCP/IP
Practical Threat Intelligence and Data-Driven Threat Hunting (digital)
Practical UNIX and Internet Security: Third Edition
Practical Vulnerability Management
Practice of Network Security Monitoring, The
Principles of Scientific Management, The
Programming TypeScript (digital)
Project to Product: How to Survive and Thrive in the Age of Digital Disruption with the Flow Framework
Prometheus Up & Running (digital)
Promises for the Graduate
Publication Manual of the American Psychological Association
Python Cookbook 3rd Edition (digital)
Python Crash Course (digital)
Python Data Science Handbook (digital)
Python Flash Cards (digital)
Python for Kids (digital)
Python Playground (digital)
Python Pocket Reference
Python Programming: An Introduction to Computer Science
Quiet
R Cookbook 2nd Edition (digital)
Ransomware Cyber and Extortion
Raspberry Pi Cookbook 3rd Edition (digital)
Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself
React Cookbook 2nd Edition (digital)
Ready For Anything: 52 Productivity Principles for Getting Things Done
Real business of IT, The
Red Team Field Manual (RTFM)
Reference Guide to Grammer and Usage
Regular Expressions Cookbook 2nd edition (digital)
Rentless: From Good to Great to Unstoppable
Researching and Writing Across the Curriculum
Resonate: Present visual stories that transform audiences
Rework
Road Ahead, The
Road to Serfdom, The
Rock Says, The
Running on Empty
Sacred Hoops
SAS Survival Handbook, 3rd Edition
Scaling Up Excellence: Getting to More Without Settling for Less
Secret & Lies Digital Security in a Networked World
Secrets and Lies (digital)
Securing 5G and Evolving Architectures
Security Administrator Street Smarts
Security and Microservice Architecture on AWS
Security Chaos Engineering
Security Metrics
sed & awk 2nd Edition
Seeking SRE (digital)
Serious Python (digital)
Seven Habits of Highly Effective People, The
Six Sigma for Everyone
Six Sigma for Managers
Six Sigma Way, The
Six Sigma: The Breakthrough Management Strategy Revolutionizing the World's Top Corporations
Skinny Legs and All
Smartest Guys in the Room, The
Social Engineering: The Science of Human Hacking (digital)
Society Must Be Defended
Software Architect Elevator, The
Software Architecture Metrics
Software Architecture: The Hard Parts
Software Requirements Second Edition
Software Security
Speaking your way to the top
Spook Country
SQL Injection Attacks and Defense
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
St. Martin's Guide to Writing, The
Steve Jobs
Structure of Scientific Revolutions, The
Success @ Life: A Zentrepreneur's Guide
Super Crunchers Why thinking-by-numbers is the new way to be smart
Super Freakonomics
T-SQL Fundamentals 3rd Edition
Taken for a ride
Takeover, The
Tao of Network Security Monitoring, The
TCP/IP Illustrated, Volume 1: The Protocols
TCP/IP Illustrated, Volume 2: The Implementation
TCP/IP Illustrated, Volume 3: TCP for Transactions
Teach Your Kids To Code (digital)
Teach Yourself TCP/IP
Technical Communication Eighth Edition
Terraform Up & Running (digital)
Test-Driven Development with Python (digital)
The Four Agreements
Think Python (digital)
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Thoughtful Machine Learning with Python (digital)
Threat Modeling
Threat Modeling: designing for security (digital)
Three Laws of Performance, The
Three signs of a miserable job, The
Time Based Security
Tipping Point, The
Titan
To Sell is Human: the surprising truth about moving others
Toyota Kata: Managing People for Improvement, Adaptiveness and Superior Results
Toyota Way, The
Transformational Security Awareness (digital)
Transparent Society, The
Tribal Leadership
Tribe of Hackers (digital)
Tribe of Hackers Blue Team (digital)
Tribe of Hackers Red Team (digital)
Tribe of Hackers Security Leaders (digital)
Troubleshooting Linux Firewalls
Turn the Ship Around!
Unauthorized Access (digital)
Undercover Economist, The
Unicorn Project, The: A Novel about Developers, Digital Disruption, and Thriving in the Age of Data
Unity Game Development Cookbook (digital)
UNIX Network Programming Volume 2: Interprocess Communications, Second Edition
UNIX Power Tools
UNIX Power Tools 3rd Edition
Using AsyncIO in Python (digital)
vi and Vim 7th Edition
Vice and Virtue in Everyday Life Third Edition
View from the Center of the Universe, The
Villa Incognito
Visible Ops Security: Achieving Common Security And IT Operations Objectives In 4 Practical Steps
Vue.js Up & Running (digital)
War of Art, The: Break through the blocks and win your inner creative battles
Ways of Reading
Wealth of Nations, The
Web Application Hacker's Handbook, The: Second Edition (digital)
Web Application Security
Web Scraping with Python (digital)
Web Security for Developers
What I Didn't Learn in Business School: How Strategy Works in the Real World
What is Lean Six Sigma?
What the dog saw
Where Wizards Stay Up Late: The Origins Of The Internet
Where's Mom now that I need her?
Why CEOs Fail
Will to Lead, The
Window's 2000 Server Administrator's Companion
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Server 2012 Pocket Consultant
Wired Tower, The
Wireshark for Security Professionals (digital)
Wisdom of Crowds, The
Words You Should Know, The
World is Flat, The
Writer's Companion
Writing Treatments that Sell
Zero
Zero Day
Zero Trust Architecture
Zero Trust Networks
Zone to Win
Copyright © 2007-2024 by chad