Technology Strategy Patterns
Eben Hewitt
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Machine Learning Q and AI: 30 Essential Questions and Answers ...
Sebastian Raschka
The Vulnerability Researcher’s Handbook
Benjamin Strout
Threat Hunting with Elastic Stack
Andrew Pease
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
PowerShell Automation and Scripting for Cybersecurity
Miriam C. Wiesner
Operationalizing Threat Intelligence
Kyle Wilhoit Joseph Opacki
Mastering Windows Security and Hardening
Mark Dunkerley and Matt Tumbarello
Mastering Python for Networking and Security
José Manuel Ortega
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Mastering Cloud Security Posture Management (CSPM)
Qamar Nomani
Machine Learning Security Principles
John Paul Mueller
Learn Computer Forensics
William Oettinger
Industrial Cybersecurity
Pascal Ackerman
Incident Response with Threat Intelligence
Roberto Martínez
Ghidra Software Reverse Engineering for Beginners
A. P. David
Digital Forensics and Incident Response
Gerard Johansen
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Automating Security Detection Engineering
Dennis Chow
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair