Effective Threat Investigation for SOC Analysts
Mostafa Yahia
Introduction to Computer Organization
Robert G. Plantz
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau