Industrial Cybersecurity
Pascal Ackerman
Privilege Escalation Techniques
Alexis Ahmed
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Malware Analysis Techniques
Dylan Barker
Learn Wireshark
Lisa Bock
Adversarial Tradecraft in Cybersecurity
Dan Borges
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Erdal Ozkaya
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Practical Linux Forensics
Bruce Nikkel
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Threat Hunting with Elastic Stack
Andrew Pease
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Pentesting Industrial Control Systems
Paul Smith
Empirical Cloud Security
Aditya K. Sood
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Practical Hardware Pentesting
Jean-Georges Valle
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
The Tangled Web
Michal Zalewski