Methods of Oppressive Regimes
Trans Army
Weaponized Incompetence
ICE Risk Mitigation
Cyberia
Chris Lynch
Computer Networking: A Top-Down Approach
James F. Kurose & Keith W. Ross