Effective C
Robert C. Seacord
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Threat Hunting with Elastic Stack
Andrew Pease
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau