Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Super Power, Spoony Bards, and Silverware: The Super Nintendo ...
Dominic Arsenault
Dungeons and Desktops: The History of Computer Role-Playing ...
Matt Barton
Counterstrike
Joshua Dalzelle
Black Fleet Trilogy (3)
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Secrets and Lies: Digital Security in a Networked World
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Threat Modeling: Designing for Security
Adam Shostack