Adversarial Tradecraft in Cybersecurity
Dan Borges
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Empirical Cloud Security
Aditya K. Sood
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Industrial Cybersecurity
Pascal Ackerman
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Learn Wireshark
Lisa Bock
Linux Firewalls
Michael Rash
Malware Analysis Techniques
Dylan Barker
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff & Per Larsen
Mastering Palo Alto Networks
Tom Piens
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Penetration Testing
Georgia Weidman
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Pentesting Industrial Control Systems
Paul Smith
Practical Hardware Pentesting
Jean-Georges Valle
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Privilege Escalation Techniques
Alexis Ahmed
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
The Tangled Web
Michal Zalewski
Threat Hunting with Elastic Stack
Andrew Pease
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto