Silence on the Wire
Michal Zalewski
The Tangled Web
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Personal Cybersecurity
Marvin Waschke
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Cybersecurity Incident Response
Eric C. Thompson
iOS Application Security
David Thiel
Mastering Linux Security and Hardening
Donald A. Tevault
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
The Car Hacker’s Handbook
Craig Smith
Advanced API Security
Prabath Siriwardena
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Threat Modeling
Adam Shostack
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
PCI DSS
Jim Seaman
We Have Root
Bruce Schneier
Secrets & Lies: Digital Security in a Networked World
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Practical Cyber Forensics
Niranjan Reddy
Becoming the Hacker
Adrian Pruteanu
JWT Handbook
Sebastián E. Peyrott
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Gray Hat C#
Brandon Perry
Firewalls Don't Stop Dragons
Carey Parker
OAuth 2.0 Simplified
Aaron Parecki
Professional Red Teaming
Jacob G. Oakley
Cybersecurity for Space
Waging Cyber War
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, ...
Scott Norberg
Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
Practical Forensic Imaging
Bruce Nikkel
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Network Security and Cryptography
Sarhan M. Musa
SELinux User's and Administrator's Guide
Mirek Jahoda & Barbora Ančincová & Ioanna Gkioka & Tomáš Čapek
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...
Ben Malisow
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Securing Office 365
Matthew Katzer
The Hardware Hacker
Andrew Huang
Web Application Security
Andrew Hoffman
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Integrating Web Services with OAuth and PHP
Matthew Frost
Attacking Network Protocols
James Forshaw
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns