JWT Handbook
Sebastián E. Peyrott
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Firewalls Don't Stop Dragons
Carey Parker
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Advanced API Security
Prabath Siriwardena
Professional Red Teaming
Securing Office 365
Matthew Katzer
OAuth 2.0 Simplified
Aaron Parecki
Silence on the Wire
Michal Zalewski
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Security Engineering
Ross J. Anderson
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Tangled Web
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Threat Modeling
Adam Shostack
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Android Security Internals: An In-Depth Guide to Android’s Security ...
Nikolay Elenkov
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Integrating Web Services with OAuth and PHP
Matthew Frost
The Car Hacker’s Handbook
Craig Smith
Serious Cryptography
Jean-Philippe Aumasson
Practical Forensic Imaging
Bruce Nikkel
iOS Application Security
David Thiel
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Secrets & Lies: Digital Security in a Networked World
Bruce Schneier
Gray Hat C#
Brandon Perry
The Hardware Hacker
Andrew Huang
Mastering Linux Security and Hardening
Donald A. Tevault
Network Security and Cryptography
Sarhan M. Musa
SELinux User's and Administrator's Guide
Mirek Jahoda & Barbora Ančincová & Ioanna Gkioka & Tomáš Čapek
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
Ben Malisow
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Attacking Network Protocols
James Forshaw
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Becoming the Hacker
Adrian Pruteanu
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...