Cybersecurity Ops with bash
Paul Troncone and Carl Albing
PoC Or GTFO, Volume 2
Manul Laphroaig
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
PoC or GTFO
Practical Packet Analysis 3rd Edition
Chris Sanders
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Attacking Network Protocols
James Forshaw
HackingTheXbox Free
Andrew “bunnie” Huang
A Bug Hunter's Diary
Tobias Klein
The Practice of Network Security Monitoring
Richard Bejtlich
Designing BSD Rootkits
Joseph Kong
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Real-World Bug Hunting: A Field Guide to Web Hacking
Peter Yaworski
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Serious Cryptography
Jean-Philippe Aumasson
The Car Hacker’s Handbook
Craig Smith
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Linux Basics for Hackers
OccupyTheWeb
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
The Linux Command Line: A Complete Introduction, 2nd Edition
William Shotts
Résister à l’algocratie
Vincent Magos
Petit traité de résilience locale
Agnès Sinaï & Raphaël Stevens & Hugo Carton & Pablo Servigne
Security Engineering
Ross J. Anderson
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Applied Cryptography
Bruce Schneier
Advanced Penetration Testing
Wil Allsopp
Secret and lies: Digital security in a networked world
Investigating Cryptocurrencies
Nick Furneaux
Reversing: Secrets of Reverse Engineering
Eldad Eilam
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Threat Modeling
Adam Shostack
The Shellcoder’s Handbook, Second Edition: Discovering and Exploiting ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Hardware Hacker