The Tangled Web
Michal Zalewski
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Practical Hardware Pentesting
Jean-Georges Valle
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Empirical Cloud Security
Aditya K. Sood
Pentesting Industrial Control Systems
Paul Smith
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Threat Hunting with Elastic Stack
Andrew Pease
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Practical Linux Forensics
Bruce Nikkel
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Erdal Ozkaya
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Adversarial Tradecraft in Cybersecurity
Dan Borges
Learn Wireshark
Lisa Bock
Malware Analysis Techniques
Dylan Barker
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Privilege Escalation Techniques
Alexis Ahmed
Industrial Cybersecurity
Pascal Ackerman