Gun Digest Book of Modern Gun Values: The Shooter's Guide to Guns 1900 to Present
PDF
Gun Digest Book of Modern Gun Values

The No. 1 Guide to the Most Popular Guns of All Time! Today's firearms are bought, sold and traded more than ever before. This updated 18th edition of Gun Digest Book of Modern Gun Values will help you buy and sell in this active market with the utmost confidence. It is the only illustrated price guide for firearms produced from 1900 to the present, and this volume sets the standard for gun buyers and sellers--the best insurance poli...

5dc465e6502c7.jpg
PDF
Deep State: Inside the Government Secrecy Industry

"An intense journey down the rabbit hole of U.S. government secrecy. They have written an adrenaline-fueled, fast paced spy story that will change the way our society views its government. As I read Deep State, I had to continually remind myself that what I was reading was not a novel. There will be some in the chambers of power who do not want this book published, and there will be others in the dark corners of Washington's world of...

5dc465e47d806.jpg
PDF
Cyber Mercenaries: The State, Hackers, and Power

This book does an excellent job breaking the mold of current thinking by "cyber" analysts--that is, that there are cybercriminals, and there are APT actors, and you must identify, pursue, and defeat one or the other. Hogwash. Cyber criminals (or contractors, or whatever you want to call them, depending on your perspective in the global arms race for dominance in cyberspace) and APT actors not only operate in the same environment, but...

5dc1c2aec8ad0.jpg
PDF
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

Pretty broad coverage of topics. Without naming any other AWS books or authors, I'll state here that I cycled through at least 5 on the Kindle store and they were absolutely terrible(typos galore) and a few of them literally looked like the material was lifted from official AWS docs and attempts made to rewrite. Based on the author names and the presence of so many abominable typos within the first few pages of the books, I suspect t...

51Q4PH+tX5L._SY291_BO1,204,203,200_QL40_
PDF
Fundamentals of Information Risk Management Auditing

For any modern business to thrive, it must assess, control and audit the risks it faces in a manner appropriate to its risk appetite. As information-based risks and threats continue to proliferate, it is essential that they are addressed as an integral component of your enterprise’s risk management strategy, not in isolation. They must be identified, documented, assessed and managed, and assigned to risk owners so that they can be mi...

51EvmFfuBNL._SX218_BO1,204,203,200_QL40_
PDF
CompTIA Security+ Study Guide Authorized Courseware: Exam SY0-301

Absolutely the best study guide books out there. Sybex/Wiley offers a thorough and comprehensive material guide. If you want a quick exam cramming information sheet, this isn't for you. This Security+ book walked me through each of the concepts using charts and information in a way that makes sense. It's a great way to learn and retain the information because you understand it in a deeper way, rather than just memorizing facts and no...

615Qn9cR-oL._SY291_BO1,204,203,200_QL40_
PDF
The Logic of Irregular War

The five well-informed contributors to this slender volume bring varied backgrounds to asymmetric warfare. They have filled a variety of government, academic, and think-tank positions. Berman’s historical introduction underscores the global nature of such wars. Irregular war “is as old as conflict itself.” However, it “came of age” only at the end of the Cold War. Contemporary weaponry has made asymmetric wars far more lethal. The fo...

51Rg1AIDtBL._SY291_BO1,204,203,200_QL40_
PDF
Information Security Across Federal Agencies (American Political, Economic, and Security Issues)

Persistent weaknesses at 24 federal agencies illustrate the challenges they face in effectively applying information security policies and practices. Most agencies continue to have weaknesses in (1) limiting, preventing, and detecting inappropriate access to computer resources; (2) managing the configuration of software and hardware; (3) segregating duties to ensure that a single individual does not have control over all key aspects ...

61X5FbHYVVL._SY291_BO1,204,203,200_QL40_
PDF
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

I came to this book the long way around. Knowing that I had just published a military thriller in which North Korea crashes the electrical grid for the greater DC area, my brother-in-law sent me a link to David Sanger’s recent interview on NPR. Listening to Mr. Sanger confirmed some of the scariest parts of my own research. I discovered that my fictional scheme for robbing the U.S. government of electrical power is uncomfortably simi...