Web Application Security
Andrew Hoffman
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, ...
Scott Norberg
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
The Hardware Hacker
Andrew Huang
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Integrating Web Services with OAuth and PHP
Matthew Frost
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...
Ben Malisow
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
OAuth 2.0 Simplified
Aaron Parecki
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Network Security and Cryptography
Sarhan M. Musa
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Securing Office 365
Matthew Katzer
Professional Red Teaming
Jacob G. Oakley
Advanced API Security
Prabath Siriwardena
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Practical Cyber Forensics
Niranjan Reddy
Personal Cybersecurity
Marvin Waschke
Firewalls Don't Stop Dragons
Carey Parker
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
PCI DSS
Jim Seaman
Cybersecurity Incident Response
Eric C. Thompson
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Waging Cyber War
Identity Attack Vectors
Morey J. Haber & Darran Rolls
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Security Engineering
Ross J. Anderson
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Tribe of Hackers
We Have Root
Bruce Schneier
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Threat Modeling
Adam Shostack
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Secrets & Lies: Digital Security in a Networked World
Mastering Linux Security and Hardening
Donald A. Tevault
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Becoming the Hacker
Adrian Pruteanu
JWT Handbook
Sebastián E. Peyrott
Attacking Network Protocols
James Forshaw
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Gray Hat C#
Brandon Perry
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson