Résister à l’algocratie
Vincent Magos
Cybersecurity Ops with bash
Paul Troncone and Carl Albing
PoC Or GTFO, Volume 2
Manul Laphroaig
Investigating Cryptocurrencies
Nick Furneaux
PoC or GTFO
The Hardware Hacker
Andrew “bunnie” Huang
Applied Cryptography
Bruce Schneier
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Advanced Penetration Testing
Wil Allsopp
Petit traité de résilience locale
Agnès Sinaï & Raphaël Stevens & Hugo Carton & Pablo Servigne
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Threat Modeling
Adam Shostack
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Reversing: Secrets of Reverse Engineering
Eldad Eilam
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Shellcoder’s Handbook, Second Edition: Discovering and Exploiting ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Security Engineering
Ross J. Anderson
Secret and lies: Digital security in a networked world
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Linux Basics for Hackers
OccupyTheWeb
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
The Car Hacker’s Handbook
Craig Smith
Serious Cryptography
Jean-Philippe Aumasson
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Real-World Bug Hunting: A Field Guide to Web Hacking
Peter Yaworski
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Designing BSD Rootkits
Joseph Kong
The Practice of Network Security Monitoring
Richard Bejtlich
A Bug Hunter's Diary
Tobias Klein
HackingTheXbox Free
Attacking Network Protocols
James Forshaw
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Practical Packet Analysis 3rd Edition
Chris Sanders
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders