Threat Modeling: Designing for Security
Adam Shostack
Loose Leaf for Introduction to Computing Systems: From Bits ...
Sanjay Patel & Yale N. Patt
Practical Forensic Imaging: Securing Digital Evidence With Linux ...
Bruce Nikkel
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
CEH V9: Certified Ethical Hacker Version 9 Study Guide
Sean-Philip Oriyano