Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Threat Hunting with Elastic Stack
Andrew Pease
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Cyber Minds
Shira Rubinoff
AWS Certified Security – Specialty Exam Guide
Stuart Scott
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
Learn Kali Linux 2019
Glen D. Singh