..  
Beginning Security with Microsoft Technologies/
Enterprise Cybersecurity Study Guide/
Firewalls Don't Stop Dragons/
Identity Attack Vectors/
Open Source Intelligence Methods and Tools/
Practical Cryptography in Python/
Practical Cyber Forensics/
Professional Red Teaming/
Solving Identity Management in Modern Applications/
Advanced API Security/
Advanced Penetration Testing/
Applied Cryptography Protocols, Algorithms and Source Code in C/
Applied Cryptography in .NET and Azure Key Vault/
Art of Memory Forensics Detecting Malware and Threats in Windows, Linux, and Mac Memory, The/
Blender 3D By Example/
Blender for Video Production Quick Start Guide/
Cryptography Engineering Design Principles and Practical Applications/
Cyber Security on Azure/
Cybersecurity Incident Response/
Cybersecurity for Space/
Godot Engine Game Development Projects/
Hands-On C++ Game Animation Programming/
Hands-On Motion Graphics with Adobe After Effects CC/
Introducing Istio Service Mesh for Microservices/
Investigating Cryptocurrencies/
Lean Out/
Learn Clip Studio Paint/
Learn the Foundations of Blender/
Level Up Your CSS Animation Skills/
Majesty of Vue.js, The/
Malware Analyst's Cookbook and DVD Tools and Techniques for Fighting Malicious Code/
Mastering Adobe Photoshop Elements 2020/
Mastering SVG/
Mastering UI Development with Unity/
Microservices for Java Developers A Hands-on Introduction to Frameworks and Containers/
New folder/
OpenGL 4 Shading Language Cookbook/
OpenGL and GLSL Fundamentals with C++ (practical course)/
PCI DSS/
Personal Cybersecurity/
Practical Game Design/
Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation/
Privileged Attack Vectors/
Pro Azure Governance and Security/
Real-Time 3D Graphics with WebGL 2/
Reversing Secrets of Reverse Engineering/
Secrets and Lies Digital Security in a Networked World, 15th Anniversary Edition/
Securing Office 365/
Security Engineering A Guide to Building Dependable Distributed Systems, 2nd Edition/
Shellcoder's Handbook Discovering and Exploiting Security Holes, The, 2nd Edition/
Threat Modeling Designing for Security/
Unreal Engine 4 Virtual Reality Projects/
Waging Cyber War/
Web Application Hacker's Handbook Finding and Exploiting Security Flaws, The, 2nd Edition/
Wireshark for Security Professionals/
15e5b499e26c8a10.epub
15ea704e60518e05.pdf
1_ The World as Will and Presen - Arthur Schopenhauer.epub
2013 Arthur Schopenhauer-On Human Nature.epub
2016-seo-powersuite-seo-workflow.pdf
2_ The World as Will and Presen - Arthur Schopenhauer.epub
A Field Guide to Fermentation.pdf
Atlas_Shrugged-Ayn_Rand.epub
BOOK DBT Skills handbook.pdf
Beyond Good and Evil - Friedrich Nietzsche;.epub
Black Hat Python.pdf
Building Conduit: event sourcing in elixir.pdf
Building Reactive Microservices in Java Asynchronous and Event-Based Application Design.pdf
Charles-Duhigg.The-Power-of-Habit.pdf
Christian Martorella - Learning Python Web Penetration Testing_ Automate web penetration testing activities using Python (2018, Packt Publishing).epub
Countdown to Zero - Day Stuxnet and the Launch of the World's First Digital Weapon - Kim Zetter.epub
Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World.epub
Demons - Fyodor Dostoevsky.epub
Demons - Fyodor Dostoyevsky.epub
Designing Event-Driven Systems.pdf
Experimental Philosophy Volume 2 by Joshua Knobe, Shaun Nichols.pdf
Experimental Philosophy by Joshua Knobe, Shaun Nichols.pdf
Fear and Trembling and The Sickness Unto Death - Søren Kierkegaard.epub
HACKING_ THE ART OF EXPLOITATION.pdf
Hacking Web Intelligence - Open Source Intelligence and Web Reconnaissance Concepts and Techniques.pdf
Humble Book Bundle: Secure Your Stuff by Apress.zip
Humble Bundle Infosec 2 no dvd.zip
Humble Bundle Infosec 2.zip
Knative Cookbook.pdf
Kubernetes Operators.pdf
Kubernetes Patterns Reusable Components for Designing Cloud-Native Applications.pdf
Life and Death in Freud and Heidegger - Havi Carel.pdf
Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali.pdf
MBA_Business_Strategy_Degree_Training_Book.pdf
MBA_Finance_Degree_Training_Book.pdf
MBA_Human_Resources_Degree_Training_Book.pdf
MBA_Leadership_Degree_Training_Book.pdf
MBA_Management_Degree_Training_Book.pdf
MBA_Marketing_Degree_Training_Book.pdf
MBA_Recruitment_Degree_Training_Book.pdf
MBA_Sales_Degree_Training_Book.pdf
Make-1000-in-the-time-you-watch-netflix.pdf
MichaelWLucas-SshMastery2nd.epub
MickeyPetersen-MasteringEmacs.pdf
Migrating to Microservice Databases From Relational Monolith to Distributed Data.pdf
Modern Java EE Design Patterns Building Scalable Architecture for Sustainable Enterprise Development.pdf
OpenShift for Developers A Guide for Impatient Beginners.pdf
ProbStatBook.pdf
Rand, Ayn - The Fountainhead.epub
Schopenhauer_ A Very Short Intr - Christopher Janaway.epub
Stefan G. Hofmann, Michael W. Otto - Cognitive Behavioral Therapy for Social Anxiety Disorder_ Evidence-Based and Disorder-Specific Treatment Techniques-Routledge (2008.pdf
The Lean Startup .pdf
The TCP-IP Guide - A Comprehensive, Illustrated Internet Protocols Reference.epub
The_Miracle_Morning-Hal_Elrod.mobi
The_Resurrectionist_The_Lost_Work_of_Dr..pdf
Two Fundamental Problems of Eth - Schopenhauer, Arthur; Cartwrigh.epub
Wicked Cool Shell Scripts - 101 Scripts for Linux, OS X, and UNIX Systems.pdf
angular_upandrunning.epub
askoutrageously.epub
assemblylanguagestep-by-step_programmingwithlinux.epub
autopilot.epub
autopilot_txtwithcvfb.pdf
beginninglinuxprogramming.epub
bigdisconnect_060314.epub
bigdisconnect_txtwithcvfb.pdf
blockchainacrossoracle.epub
blockchainacrossoracle_supplement.zip
blockchainbyexample.epub
blockchainbyexample_supplement.zip
blockchainquickreference.epub
blockchainquickreference_supplement.zip
changeyourquestionschangeyourlife_ebook.epub
chaosandcaliphate.epub
chaosandcaliphate.pdf
cm-oreilly-kubernetes-patterns-ebook-f19824-201910-en.pdf
collaboratingwiththeenemy_ebook.epub
comptialinuxplus_lpicpracticetests_examslx0-103_lpic-1101-400_lx0-104_lpic-1102.epub
comptialinuxpluspoweredbylinuxprofessionalinstitutestudyguide_examslx0-103_lx0-104.epub
convinced_ebook.epub
crunchtime_ebook.epub
csspocketreference.epub
datavisualizationwithpythonandjavascript.epub
designingwebapis.epub
epdf.pub_the-miracle-morning.pdf
ethereumcookbook.epub
ethereumcookbook_supplement.zip
ethereumprojectsforbeginners.epub
ethereumprojectsforbeginners_supplement.zip
extinction.epub
extinction.pdf
finks.epub
finks.pdf
flaskwebdevelopment.epub
foldingtheredintotheblack.epub
foldingtheredintotheblack.pdf
foundationsofblockchain.epub
foundationsofblockchain_supplement.zip
freeloading.epub
freeloading.pdf
frommindfulnesstoheartfulness_ebook.epub
gettothepoint_ebook.epub
hands-onbitcoinprogrammingwithpython.epub
hands-onbitcoinprogrammingwithpython_supplement.zip
hands-onblockchainforpythondevelopers.epub
hands-onblockchainforpythondevelopers_supplement.zip
hands-onblockchainwithhyperledger.epub
hands-onblockchainwithhyperledger_supplement.zip
hands-oncybersecuritywithblockchain_ebook.epub
hands-oniotsolutionswithblockchain.epub
hands-oniotsolutionswithblockchain_supplement.zip
highperformanceimages.epub
iOS Penetration Testing A Definitive Guide to iOS Security.pdf
learnbitcoinandblockchain.epub
learnblockchainprogrammingwithjavascript.epub
learnblockchainprogrammingwithjavascript_supplement.zip
learninggraphql.epub
learningjavascript.epub
learningphpmysqlandjavascript.epub
learningreact1.epub
linuxall-in-onefordummies.epub
linuxbible.epub
linuxcommandline_shellscriptingbible.epub
linuxessentials.epub
linuxserversecurity_hackanddefend.epub
lpic-1_linuxprofessionalinstitutecertificationstudyguide_exams101_102.epub
lpic-2_linuxprofessionalinstitutecertificationstudyguide_exams201_202.epub
masteringblockchain.epub
masteringblockchain_supplement.zip
masteringmodularjavascript.epub
negotiatingtheimpossible.epub
ourstohackandown.epub
ourstohackandown.pdf
prisonersofourthoughts_ebook.epub
professionallinuxkernelarchitecture.epub
pure-script-by-example.pdf
redhatenterpriselinux6administration.epub
rosset.epub
rosset.pdf
secure-design-daniel-deogun.epub
secure-design-daniel-deogun.pdf
seo-workflow.pdf
shellscripting_expertrecipesforlinuxbashandmore.epub
solidityprogrammingessentials.epub
solidityprogrammingessentials_supplement.zip
splinternet.epub
splinternet.pdf
stopguessing.epub
theageofoverwhelm_ebook.epub
thegiftofanger.epub
themoodelevator_ebook.epub
theoutwardmindset_ebook.epub
thepowerofhavingfun_ebook.epub
theseriousbusinessofsmalltalk_ebook.epub
theshift_ebook.epub
tokenomics.epub
trufflequickstartguide.epub
trumpunveiled.epub
trumpunveiled.pdf
ubuntulinuxtoolbox_1000pluscommandsforpowerusers.epub
vuejs_upandrunning.epub
whatsyoursismine.epub
whatsyoursismine.pdf
whengooglemetwikileaks.epub
whengooglemetwikileaks_txtwithcvfb.pdf
whypeopledontbelieveyou_ebook.epub
youarewhatyoubelieve_ebook.epub
youdontknowjs_es6andbeyond.epub
youdontknowjs_scopeandclosures.epub
youdontknowjs_upandgoing.epub
youngmoney_ebook.epub

This folder was signed by:

Martin Sweeny

Who is also provably:

Using the Keybase filesystem.

# OSX
open /keybase/public/martin_wiseweb

# Linux
cd /keybase/public/martin_wiseweb

Install Keybase

Windows Linux macOS

Install Keybase

With Keybase installed, you can drop files onto your own computer that are immediately signed and hosted on Keybase.pub. You can also write private, end-to-end encrypted files with anyone you know.

And it comes with an encrypted chat, too.