Threat Modeling: Designing for Security
Adam Shostack
No Plan B
Lee Child
Jack Reacher (27)
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Altered Carbon
Richard K. Morgan
Takeshi Kovacs (1)
Jack Knife
Diane Capri
Hunt for Reacher (14)
Straight Jack
Hunt for Reacher (13)
Jack Frost
Hunt for Reacher (11)
Prepper Jack: Hunting Lee Child's Jack Reacher
Hunt for Reacher (9)