The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Tangled Web
Michal Zalewski
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Empirical Cloud Security
Aditya K. Sood
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Threat Hunting with Elastic Stack
Andrew Pease
Privilege Escalation Techniques
Alexis Ahmed
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Practical Hardware Pentesting
Jean-Georges Valle
Pentesting Industrial Control Systems
Paul Smith
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Mastering Palo Alto Networks
Tom Piens
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff & Per Larsen
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Malware Analysis Techniques
Dylan Barker
Learn Wireshark
Lisa Bock
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Industrial Cybersecurity
Pascal Ackerman
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Adversarial Tradecraft in Cybersecurity
Dan Borges
Real-World Software Development
Raoul-Gabriel Urma & Richard Warburton
Linux Firewalls
Michael Rash
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Penetration Testing
Georgia Weidman
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson