Adversarial Tradecraft in Cybersecurity
Dan Borges
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Erdal Ozkaya
Empirical Cloud Security
Aditya K. Sood
Industrial Cybersecurity
Pascal Ackerman
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Learn Wireshark
Lisa Bock
Malware Analysis Techniques
Dylan Barker
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Pentesting Industrial Control Systems
Paul Smith
Practical Hardware Pentesting
Jean-Georges Valle
Practical Linux Forensics
Bruce Nikkel
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Privilege Escalation Techniques
Alexis Ahmed
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
The Tangled Web
Michal Zalewski
Threat Hunting with Elastic Stack
Andrew Pease
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto