Security


Hacking: The Art of Exploitation w/CD
The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Security Engineering: A Guide to Building Dependable Distributed Systems
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Secrets and Lies: Digital Security in a Networked World
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Metasploit: The Penetration Tester's Guide
Threat Modeling: Designing for Security
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Social Engineering
Rainer Maria Rilke
most people come to know only one corner of their room, one spot near the window, one narrow strip on which they keep walking back and forth.
Rainer Maria Rilke, Letters to a Young Poet

Richelle E. Goodrich
Nothing in this world compares to the comfort and security of having someone just hold your hand.
Richelle E. Goodrich, Smile Anyway: Quotes, Verse, & Grumblings for Every Day of the Year

More quotes...
Group for book lists of History, Security and Military Books.
31 members, last active 8 years ago
Liars and Outliers by Bruce Schneier A discussion group for Bruce Schneier's latest book, Liars and Outliers. …more
7 members, last active 14 years ago
Sharing books and studies on studies on China, the United States, and the bilateral relations.
2 members, last active 5 years ago
Henley-Putnam University Reading Group Built for students from Henley-Putnam University or other DoD Schools. Any student or profession…more
15 members, last active 12 years ago