#2 | Metasploit: The Penetration Tester's Guide - David Kennedy
- Jim O'Gorman
- Devon Kearns
- Mati Aharoni
| 0 | 0 reads | |
#3 | Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 4.5 | 2 reads | |
#4 | Reversing Secrets of Reverse Engineering | 4 | 2 reads | |
#5 | | 0 | 0 reads | |
#6 | | 0 | 3 reads | |
#7 | The Tao of Vegetable Gardening: Cultivating Tomatoes, Greens, Peas, Beans, Squash, Joy, and Serenity | 0 | 0 reads | |
#8 | Practical Packet Analysis | 5 | 1 read | |
#9 | Google Hacking for Penetration Testers, Volume 1 | 0 | 0 reads | |
#10 | The web application hacker's handbook | 0 | 0 reads | |
#11 | The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes - Jack Koziol
- Chris Anley
- John Heasman
| 0 | 0 reads | |
#12 | | 4.36 | 63 reads | |
#13 | Speeches That Changed the World | 0 | 1 read | |
#14 | The Winter Harvest Handbook: Four Season Vegetable Production Using Deep-Organic Techniques and Unheated Greenhouses | 0 | 1 read | |
#15 | The resilient farm and homestead | 0 | 2 reads | |
#16 | Growing Object-oriented Software, Guided by Tests | 4.2 | 12 reads | |
#17 | Android Hacker's Handbook - Joshua J. Drake
- Zach Lanier
- Collin Mulliner
- Pau Oliva Fora
- Stephen A. Ridley
- Georg Wicherski
| 0 | 0 reads | |
#18 | | 0 | 1 read | |
#19 | Penetration Testing: A Hands-On Introduction to Hacking | 0 | 0 reads | |
#20 | The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities - Mark Dowd
- John McDonald
- Justin Schuh
| 0 | 0 reads | |
#21 | | 0 | 0 reads | |
#22 | | 4 | 2 reads | |
#23 | | 0 | 0 reads | |
#24 | Cryptography Engineering Cryptography Engineering: Design Principles and Practical Applications - Niels Ferguson
- Bruce Schneier
- Tadayoshi Kohno
| 4 | 4 reads | |
#25 | | 4.5 | 4 reads | |
#26 | The Body: A Guide for Occupants | 4.18 | 154 reads | |
#27 | El Vendedor Mas Grande Del Mundo/Greatest Salesman on Earth | 3.79 | 18 reads | |
#28 | | 4.17 | 36 reads | |
#29 | | 3 | 4 reads | |