Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
PoC or GTFO
Manul Laphroaig
iOS Application Security
David Thiel
Ethics for the Information Age
Michael J. Quinn
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
Threat Modeling: Designing for Security
Adam Shostack
The Smart Girl's Guide to Privacy: Practical Tips for Staying ...
Violet Blue
The Practice of Network Security Monitoring: Understanding Incident ...
Richard Bejtlich
The Car Hacker's Handbook: A Guide for the Penetration Tester
Craig Smith
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
Secrets and Lies: Digital Security in a Networked World
Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World ...
Chris Sanders
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical Forensic Imaging: Securing Digital Evidence With Linux ...
Bruce Nikkel
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Metasploit: The Penetration Tester's Guide
David Kennedy & Devon Kearns
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Game Hacking: Developing Autonomous Bots for Online Games
Nick Cano
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov