Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Hardcore Programming For Mechanical Engineers: Build Engineering ...
Ángel Sola Orbaiceta
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
Learn Kali Linux 2019
Glen D. Singh
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Linux Basics for Hackers
OccupyTheWeb
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
Machine Learning Security Principles
John Paul Mueller
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Mastering Python for Networking and Security
José Manuel Ortega
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Math for Deep Learning: What You Need to Know to Understand ...
Ronald T. Kneusel
Metasploit 5.0 for Beginners – Second Edition
Sagar Rahalkar
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
Natural Language Processing for Social Media, Third Edition
Anna Atefeh Farzindar and Diana Inkpen
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Practical Deep Learning: A Python-Based Introduction
Practical Hardware Pentesting
Jean-Georges Valle
Practical Julia: A Hands-On Introduction for Scientific Minds
Lee Phillips
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & and Satish Bommisetty
Practical Packet Analysis 3rd Edition
Chris Sanders
Practical Process Automation
Bernd Ruecker
Practical Threat Detection Engineering
Megan Roddie & Jason Deyalsingh & Gary J. Katz
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
The Secret Life of Programs: Understand Computers — Craft Better ...
Jonathan E. Steinhart
Serious Cryptography
Jean-Philippe Aumasson
Serverless Development on AWS
Sheen Brisals and Luke Hedger
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
The Software Architect Elevator
Gregor Hohpe
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
Software Architecture Patterns
Mark Richards
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Technology Strategy Patterns
Eben Hewitt
Threat Hunting with Elastic Stack
Andrew Pease
The Vulnerability Researcher’s Handbook
Benjamin Strout
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls
Joyce Weiner
Write Great Code, Volume 1: Understanding the Machine, 2nd Edition
Randall Hyde
Writing a C Compiler
Nora Sandler