Bastille vs. the Evil Librarians
Brandon Sanderson
Alcatraz vs. the Evil Librarians (6)
Charmed Life
Diana Wynne Jones
Chrestomanci (Recommended Reading Order) (1)
The Vulnerability Researcher’s Handbook
Benjamin Strout
I Can Read With My Eyes Shut!
Dr. Seuss
The Cat in the Hat (1)
The Unofficial Princess Bride Cookbook
Cassandra Reeder
Where the Red Fern Grows
Wilson Rawls
Summer of the Monkeys
Enterprise Application Development with C# 10 and .NET 6
Ravindra Akella, Arun Kumar Tamirisa, Suneel Kumar Kunani, Bhupesh ...
The Unofficial Simpsons Cookbook: From Krusty Burgers to Marge's ...
Laurel Randolph
Not with a Bug, But with a Sticker: Attacks on Machine Learning ...
Ram Shankar Siva Kumar & Hyrum Anderson
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Hands-On Object-Oriented Programming with C#
Raihan Taher
C# 10 and .NET 6 – Modern Cross-Platform Development
Mark J. Price
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals, ...
Blockchain Security from the Bottom Up: Securing and Preventing ...
Howard E. Poston III
Python® for Cybersecurity: Using Python for Cyber Offense and ...
Abby Carnelia's One and Only Magical Power
David Pogue
Threat Hunting in the Cloud: Defending AWS®, Azure® and Other ...
Chris Peiris & Binil Pillai & Abbas Kudrati
Threat Hunting with Elastic Stack
Andrew Pease
The Great Gilly Hopkins
Katherine Paterson
Bridge to Terabithia
My Brigadista Year
Lyddie
Stories of My Life
Practical Simulations for Machine Learning
Paris Buttfield-Addison, Mars Buttfield-Addison, Tim Nugent & Jon Manning
A Developer's Guide to .NET in Azure
Anuraj Parameswaran & Tamir Al Balkhi
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Selected Essays
George Orwell
Diaries
Homage to Catalonia
Shooting an Elephant
Burmese days
The Road to Wigan Pier
A Clergyman’s Daughter
Down and Out in Paris and London
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
The Unofficial Sims Cookbook: From Baked Alaska to Silly Gummy ...
Taylor O'Halloran
Mrs Frisby and the Rats of NIMH
Robert C. O'Brien
Rats of NIMH (1)
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
The MVVM Pattern in .NET MAUI
Pieter Nijs
Essential Math for AI
Hala Nelson
The Nightmare Before Dinner
Zach Neil
The Unofficial Tiktok Cookbook: 75 Internet-Breaking Recipes ...
Valentina Mussi
Machine Learning Security Principles
John Paul Mueller
AI and Machine Learning for Coders
Laurence Moroney
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Death of a Salesman: Certain Private Conversations in Two Acts ...
Arthur Miller
Broken Glass
The Price
Presence: Collected Stories
The Crucible
The Portable Arthur Miller
All My Sons
Silence on the Wire
Michal Zalewski
Endgame
David Michaels
Tom Clancy's Splinter Cell (6)
Conviction
Tom Clancy's Splinter Cell (5)
Fallout
Tom Clancy's Splinter Cell (4)
Checkmate
Tom Clancy's Splinter Cell (3)
Operation Barracuda
Tom Clancy's Splinter Cell (2)
Splinter Cell
Tom Clancy's Splinter Cell (1)
Combat Ops
Tom Clancy's Ghost Recon (2)
Ghost Recon
Tom Clancy's Ghost Recon (1)
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Regular Expression Puzzles and AI Coding Assistants
David Q. Mertz