Dangerous Women
George R.R. Martin
The Dresden Files (13.10)
Black Powder War
Naomi Novik
Temeraire (3)
Tiamat's Wrath
James S.A. Corey
The Expanse (8)
Ring
Stephen Baxter
Xeelee Sequence (4)
Threat Modeling: Designing for Security
Adam Shostack
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Applied Cryptography: Protocols, Algorithms and Source Code ...
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Social Engineering: The Science of Human Hacking
Christopher Hadnagy