Raspberry Pi® Projects
Dr. Andrew Robinson
Exploring BeagleBone
Derek Molloy
Complete Electronics Self-Teaching Guide with Projects
Earl Boysen & Harry Kybett
Adventures in Raspberry Pi®
Carrie Anne Philbin
Arduino For Dummies
John Nussey
BeagleBone For Dummies®
Rui Santos & Luís Perestrelo
Raspberry Pi® For Dummies®
Sean McManus & Mike Cook
Raspberry Pi® Projects For Dummies®
Mike Cook
Do-It-Yourself Circuitbuilding For Dummies
H. Ward Silver
Secrets & Lies: Digital Security in a Networked World
Bruce Schneier
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Threat Modeling
Adam Shostack
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
We Have Root
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Security Engineering
Ross J. Anderson
Applied Cryptography
Tribe of Hackers: Red Team
Reversing: Secrets of Reverse Engineering
Eldad Eilam
Investigating Cryptocurrencies
Nick Furneaux
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Google BigQuery: The Definitive Guide
Valliappa Lakshmanan & Jordan Tigani
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Maven: The Definitive Guide
Sonatype Company
Spark: The Definitive Guide
Matei Zaharia & Bill Chambers
MongoDB: The Definitive Guide
Eoin Brazil & Kristina Chodorow & Shannon Bradshaw
Java Performance: The Definitive Guide
Scott Oaks
Kafka: The Definitive Guide
Neha Narkhede & Gwen Shapira & Todd Palino
JavaScript: The Definitive Guide
David Flanagan
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Hadoop: The Definitive Guide
Tom White
Cassandra: The Definitive Guide
Eben Hewitt & Jeff Carpenter
Elasticsearch: The Definitive Guide
Clinton Gormley & Zachary Tong
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Firewalls Don't Stop Dragons
Carey Parker
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Advanced API Security
Prabath Siriwardena
Professional Red Teaming