Industrial Cybersecurity
Pascal Ackerman
Privilege Escalation Techniques
Alexis Ahmed
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Malware Analysis Techniques
Dylan Barker
Learn Wireshark
Lisa Bock
Adversarial Tradecraft in Cybersecurity
Dan Borges
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff & Per Larsen
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Threat Hunting with Elastic Stack
Andrew Pease
Mastering Palo Alto Networks
Tom Piens
Linux Firewalls
Michael Rash
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Practical Malware Analysis
Michael Sikorski & Andrew Honig
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Pentesting Industrial Control Systems
Paul Smith
Empirical Cloud Security
Aditya K. Sood
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Practical Hardware Pentesting
Jean-Georges Valle
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Penetration Testing
Georgia Weidman
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
The Tangled Web
Michal Zalewski