Adversarial Tradecraft in Cybersecurity
Dan Borges
Attacking Network Protocols
James Forshaw
Black Hat Go
Tom Steele & Chris Patten & Dan Kottmann
Book of PF, 3rd Edition
Peter N. M. Hansteen
The Car Hacker's Handbook
Craig Smith
Cracking Codes with Python
Al Sweigart
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
Cybersecurity
Duane C. Wilson
Cybersecurity Career Master Plan
Dr. Gerald Auger & Jaclyn “Jax” Scott & Jonathan Helmus & Kim Nguyen & Heath "The Cyber Mentor" Adams
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes & Erdal Ozkaya
Designing BSD Rootkits
Joseph Kong
Empirical Cloud Security
Aditya K. Sood
Foundations of Information Security
Jason Andress
Hacking Kubernetes
Andrew Martin & Michael Hausenblas
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
The Hardware Hacker
Andrew Bunnie Huang
Industrial Cybersecurity
Pascal Ackerman
Internet of Things - The Call of the Edge: Everything Intelligent ...
Ovidiu Vermesan & Joël Bacquet
Internet of Things Security: Fundamentals, Techniques and Applications
Weippl, Edgar
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen & Pedro Igor Silva
Learn Wireshark
Lisa Bock
Linux Firewalls
Michael Rash
Malware Analysis Techniques
Dylan Barker
Malware Data Science
Joshua Saxe & Hillary Sanders
Mastering Defensive Security
Cesar Bravo & Darren Kitchen
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
Penetration Testing
Georgia Weidman
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Pentesting Industrial Control Systems
Paul Smith
Practical Binary Analysis
Dennis Andriesse
Practical Hardware Pentesting
Jean-Georges Valle
Practical Linux Forensics
Bruce Nikkel
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Costa-Gazcon
Privilege Escalation Techniques
Alexis Ahmed
Real-World Bug Hunting
Peter Yaworski
Rootkits and Bootkits
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Secure and Smart Internet of Things (IoT)
Ahmed Banafa
Serious Cryptography
Jean-Philippe Aumasson
The Tangled Web
Michal Zalewski
Threat Hunting with Elastic Stack
Andrew Pease
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Web Security for Developers
Malcolm McDonald