Linux Firewalls
Michael Rash
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Tangled Web
Michal Zalewski
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Penetration Testing
Georgia Weidman
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Learn Wireshark
Lisa Bock
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Mastering Palo Alto Networks
Tom Piens
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Practical Hardware Pentesting
Jean-Georges Valle
Empirical Cloud Security
Aditya K. Sood
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Adversarial Tradecraft in Cybersecurity
Dan Borges
Malware Analysis Techniques
Dylan Barker
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Threat Hunting with Elastic Stack
Andrew Pease
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Industrial Cybersecurity
Pascal Ackerman
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff & Per Larsen
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Privilege Escalation Techniques
Alexis Ahmed
Pentesting Industrial Control Systems
Paul Smith
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu