(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...
Ben Malisow
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
Advanced API Security
Prabath Siriwardena
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Jacob G. Oakley
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Firewalls Don't Stop Dragons
Carey Parker
Foundations of Information Security: A Straightforward Introduction
Jason Andress
The Hardware Hacker
Andrew Huang
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Network Security and Cryptography
Sarhan M. Musa
OAuth 2.0 Simplified
Aaron Parecki
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
PCI DSS
Jim Seaman
Personal Cybersecurity
Marvin Waschke
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Practical Cyber Forensics
Niranjan Reddy
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Professional Red Teaming
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Secrets & Lies: Digital Security in a Networked World
Bruce Schneier
Securing Office 365
Matthew Katzer
Security Engineering
Ross J. Anderson
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Threat Modeling
Adam Shostack
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers: Red Team
Understanding Privacy
Heather Burns
Waging Cyber War
We Have Root
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker