The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Harry Potter and the Prisoner of Azkaban
J.K. Rowling
Harry Potter (3)
Refactoring with C#
Matt Eland
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina PalacĂn
Ghost Recon
David Michaels
Tom Clancy's Ghost Recon (1)
Combat Ops
Tom Clancy's Ghost Recon (2)