Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
How Software Works
V. Anton Spraul
Write Great Code, Volume 1: Understanding the Machine, 2nd Edition
Randall Hyde
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Learn Computer Forensics
William Oettinger
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Practical Hardware Pentesting
Jean-Georges Valle
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Cyber Minds
Shira Rubinoff
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
Mastering Python for Networking and Security
José Manuel Ortega
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Ghidra Software Reverse Engineering for Beginners
A. P. David
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil
AWS Penetration Testing
Jonathan Helmus
The Car Hacker’s Handbook
Craig Smith
The Hardware Hacker
Andrew “bunnie” Huang
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Practical Packet Analysis 3rd Edition
Chris Sanders
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Serious Cryptography
Jean-Philippe Aumasson
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
Attacking Network Protocols
James Forshaw
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Linux Basics for Hackers
OccupyTheWeb
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Writing a C Compiler
Nora Sandler
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
The Complete Developer
Martin Krause
The Book of I2C
Introduction to Computer Organization
Robert G. Plantz
Inside the Machine
Jon Stokes
How Computers Really Work: A Hands-On Guide to the Inner Workings ...
Matthew Justice
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
Graph Algorithms the Fun Way
Jeremy Kubica
Effective C
Robert C. Seacord
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Computer Graphics from Scratch: A Programmer’s Introduction ...
Gabriel Gambetta
Computer Architecture
Charles Fox
Code Craft
Pete Goodliffe