Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Security Engineering
Ross J. Anderson
Foundations of Information Security: A Straightforward Introduction
Jason Andress
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Serious Cryptography
Jean-Philippe Aumasson
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers: Red Team
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Cyber Security on Azure
Marshall Copeland
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Attacking Network Protocols
James Forshaw
Integrating Web Services with OAuth and PHP
Matthew Frost
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Web Application Security
Andrew Hoffman
The Hardware Hacker
Andrew Huang
Securing Office 365
Matthew Katzer
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
Ben Malisow
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
SELinux User's and Administrator's Guide
Mirek Jahoda & Barbora Ančincová & Ioanna Gkioka & Tomáš Čapek
Network Security and Cryptography
Sarhan M. Musa
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Practical Forensic Imaging
Bruce Nikkel
Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, ...
Scott Norberg
Waging Cyber War
Jacob G. Oakley
Cybersecurity for Space
Professional Red Teaming
OAuth 2.0 Simplified
Aaron Parecki
Firewalls Don't Stop Dragons
Carey Parker
Gray Hat C#
Brandon Perry
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
JWT Handbook
Sebastián E. Peyrott
Becoming the Hacker
Adrian Pruteanu
Practical Cyber Forensics
Niranjan Reddy
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Secrets & Lies: Digital Security in a Networked World
Bruce Schneier
We Have Root
PCI DSS
Jim Seaman
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Threat Modeling
Adam Shostack
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Advanced API Security
Prabath Siriwardena
The Car Hacker’s Handbook
Craig Smith