Web Application Security
Andrew Hoffman
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, ...
Scott Norberg
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Tribe of Hackers
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
We Have Root
Bruce Schneier
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...
Ben Malisow
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Becoming the Hacker
Adrian Pruteanu
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Attacking Network Protocols
James Forshaw
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
SELinux User's and Administrator's Guide
Mirek Jahoda & Barbora Ančincová & Ioanna Gkioka & Tomáš Čapek
Network Security and Cryptography
Sarhan M. Musa
Mastering Linux Security and Hardening
Donald A. Tevault
Gray Hat C#
Brandon Perry
The Hardware Hacker
Andrew Huang
Secrets & Lies: Digital Security in a Networked World
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
The Car Hacker’s Handbook
Craig Smith
Serious Cryptography
Jean-Philippe Aumasson
Practical Forensic Imaging
Bruce Nikkel
iOS Application Security
David Thiel
Integrating Web Services with OAuth and PHP
Matthew Frost
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Threat Modeling
Adam Shostack
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
The Tangled Web
Michal Zalewski
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Security Engineering
Ross J. Anderson
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Silence on the Wire
JWT Handbook
Sebastián E. Peyrott
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Firewalls Don't Stop Dragons
Carey Parker