Advanced Penetration Testing
Wil Allsopp
Applied Cryptography
Bruce Schneier
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Attacking Network Protocols
James Forshaw
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele & Chris Patten & Dan Kottmann
A Bug Hunter's Diary
Tobias Klein
The Car Hacker’s Handbook
Craig Smith
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
HackingTheXbox Free
Andrew “bunnie” Huang
The Hardware Hacker
Linux Basics for Hackers
OccupyTheWeb
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Metasploit
David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Pentesting Azure Applications: The Definitive Guide to Testing ...
Matt Burrough
Petit traité de résilience locale
Agnès Sinaï & Raphaël Stevens & Hugo Carton & Pablo Servigne
PoC or GTFO
Manul Laphroaig
PoC Or GTFO, Volume 2
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
Practical Packet Analysis 3rd Edition
Chris Sanders
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
The Practice of Network Security Monitoring
Richard Bejtlich
Real-World Bug Hunting: A Field Guide to Web Hacking
Peter Yaworski
Reversing: Secrets of Reverse Engineering
Eldad Eilam
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Secret and lies: Digital security in a networked world
Security Engineering
Ross J. Anderson
Serious Cryptography
Jean-Philippe Aumasson
The Shellcoder’s Handbook, Second Edition: Discovering and Exploiting ...
Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte
Threat Modeling
Adam Shostack
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Cybersecurity Ops with bash
Paul Troncone and Carl Albing