Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Web Application Security
Andrew Hoffman
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
We Have Root
Bruce Schneier
Waging Cyber War
Jacob G. Oakley
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Tribe of Hackers
Threat Modeling
Adam Shostack
The Tangled Web
Michal Zalewski
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Silence on the Wire
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Serious Cryptography
Jean-Philippe Aumasson
SELinux User's and Administrator's Guide
Mirek Jahoda & Barbora Ančincová & Ioanna Gkioka & Tomáš Čapek
Security Engineering
Ross J. Anderson
Securing Office 365
Matthew Katzer
Secrets & Lies: Digital Security in a Networked World
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Professional Red Teaming
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Practical Forensic Imaging
Bruce Nikkel
Practical Cyber Forensics
Niranjan Reddy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Personal Cybersecurity
Marvin Waschke
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
PCI DSS
Jim Seaman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
OAuth 2.0 Simplified
Aaron Parecki
Network Security and Cryptography
Sarhan M. Musa
Metasploit
Mati Aharoni & David Kennedy & Jim O'Gorman & Devon Kearns
Mastering Linux Security and Hardening
Donald A. Tevault
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
JWT Handbook
Sebastián E. Peyrott
iOS Application Security
David Thiel
Integrating Web Services with OAuth and PHP
Matthew Frost
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Hardware Hacker
Andrew Huang
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Gray Hat C#
Brandon Perry
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Firewalls Don't Stop Dragons
Carey Parker
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Computer Security and Encryption
S. R. Chauhan & S. Jangra
The Car Hacker’s Handbook
Craig Smith
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz