Books

Attacks, Exploits, Vulnerabilities, and Cryptanalysis

Court Documents: Complaints, Appeals, etc.

Government Policy Documents and Reports

Policies, Programs, and Technology that Threaten Privacy and Security

Tools and Technology to Enhance Privacy and Security

Other (mostly just documents not yet sorted)