The Tangled Web
Michal Zalewski
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Penetration Testing
Georgia Weidman
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Practical Hardware Pentesting
Jean-Georges Valle
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Empirical Cloud Security
Aditya K. Sood
Pentesting Industrial Control Systems
Paul Smith
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Linux Firewalls
Michael Rash
Mastering Palo Alto Networks
Tom Piens
Threat Hunting with Elastic Stack
Andrew Pease
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff & Per Larsen
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Adversarial Tradecraft in Cybersecurity
Dan Borges
Learn Wireshark
Lisa Bock
Malware Analysis Techniques
Dylan Barker
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Privilege Escalation Techniques
Alexis Ahmed
Industrial Cybersecurity
Pascal Ackerman