Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
The Vulnerability Researcher’s Handbook
Benjamin Strout
Practical Hardware Pentesting
Jean-Georges Valle
Building Event-Driven Microservices
Adam Bellemare
Cyber Minds
Shira Rubinoff