Practical Packet Analysis 3rd Edition
Chris Sanders
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
Learn Computer Forensics
William Oettinger
Mastering Python for Networking and Security
José Manuel Ortega
Ghidra Software Reverse Engineering for Beginners
A. P. David
Threat Hunting with Elastic Stack
Andrew Pease
Industrial Cybersecurity
Pascal Ackerman
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Incident Response with Threat Intelligence
Roberto Martínez
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Digital Forensics and Incident Response
Gerard Johansen
The Vulnerability Researcher’s Handbook
Benjamin Strout
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Machine Learning Security Principles
John Paul Mueller
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Automating Security Detection Engineering
Dennis Chow