Practical Linux Forensics
Bruce Nikkel
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Tangled Web
Michal Zalewski
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Empirical Cloud Security
Aditya K. Sood
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Threat Hunting with Elastic Stack
Andrew Pease
Privilege Escalation Techniques
Alexis Ahmed
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Practical Hardware Pentesting
Jean-Georges Valle
Pentesting Industrial Control Systems
Paul Smith
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Malware Analysis Techniques
Dylan Barker
Learn Wireshark
Lisa Bock
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Industrial Cybersecurity
Pascal Ackerman
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Erdal Ozkaya
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Adversarial Tradecraft in Cybersecurity
Dan Borges