Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
We Have Root
Bruce Schneier
Waging Cyber War
Jacob G. Oakley
Understanding Privacy
Heather Burns
Tribe of Hackers: Red Team
Marcus J. Carey & Jennifer Jin
Tribe of Hackers
Threat Modeling
Adam Shostack
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
The Shellcoder’s Handbook: Discovering and Exploiting Security ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Security Engineering
Ross J. Anderson
Securing Office 365
Matthew Katzer
Secrets & Lies: Digital Security in a Networked World
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Professional Red Teaming
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Practical Cyber Forensics
Niranjan Reddy
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Personal Cybersecurity
Marvin Waschke
PCI DSS
Jim Seaman
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
OAuth 2.0 Simplified
Aaron Parecki
Network Security and Cryptography
Sarhan M. Musa
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Malware Analyst's Cookbook
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Hardware Hacker
Andrew Huang
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Firewalls Don't Stop Dragons
Carey Parker
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cybersecurity: Blue Team Toolkit
Nadean H. Tanner
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Cybersecurity Ops with bash
Paul Troncone & Carl Albing
Cybersecurity Incident Response
Eric C. Thompson
Cybersecurity for Space
Cyber Security on Azure
Marshall Copeland
Cryptography Apocalypse: Preparing for the Day When Quantum ...
Roger A. Grimes
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Advanced API Security
Prabath Siriwardena
(ISC)2® CCSP® Certified Cloud Security Professional: Official ...
Ben Malisow
(ISC)2 CCSP Certified Cloud Security Professional Official Practice ...