Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Personal Cybersecurity
Marvin Waschke
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Advanced API Security
Prabath Siriwardena
Threat Modeling
Adam Shostack
PCI DSS
Jim Seaman
We Have Root
Bruce Schneier
Secrets & Lies: Digital Security in a Networked World
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Firewalls Don't Stop Dragons
Carey Parker
OAuth 2.0 Simplified
Aaron Parecki
Professional Red Teaming
Jacob G. Oakley
Cybersecurity for Space
Waging Cyber War
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Network Security and Cryptography
Sarhan M. Musa
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...
Ben Malisow
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Securing Office 365
Matthew Katzer
The Hardware Hacker
Andrew Huang
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Cyber Security on Azure
Marshall Copeland
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Tribe of Hackers
Understanding Privacy
Heather Burns
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Security Engineering
Ross J. Anderson
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp