Investigating Cryptocurrencies
Nick Furneaux
Applied Cryptography
Bruce Schneier
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Advanced Penetration Testing
Wil Allsopp
Understanding Color
Linda Holtzschue
Designing For The Digital Age
Kim Goodwin
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Android™ Design Patterns
Greg Nudelman
About Face
Alan Cooper & Robert Reimann & David Cronin & Chris Noessel
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Designing Information
JOEL KATZ
Threat Modeling
Adam Shostack
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Type Rules!
Ilene Strizver
Designing the Internet of Things
Adrian McEwen, Hakim Cassimally
Evil By Design
Chris Nodder
Usable Usability
Eric Reiss
Reversing: Secrets of Reverse Engineering
Eldad Eilam
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Design for Hackers: Reverse-Engineering Beauty
David Kadavy
Designing Search
Handbook of Usability Testing
Jeffrey Rubin
The Shellcoder’s Handbook, Second Edition: Discovering and Exploiting ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Communicating the User Experience
Richard Caddick & Steve Cable
Security Engineering
Ross J. Anderson
The Essential Guide to User Interface Design
Wilbert O. Galitz
Secret and lies: Digital security in a networked world