Malware Analyst's Cookbook and DVD: Tools and Techniques for ...
Michael Ligh & Steven Adair
Ethics for the Information Age
Michael J. Quinn
Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World ...
Chris Sanders
Threat Modeling: Designing for Security
Adam Shostack
Loose Leaf for Introduction to Computing Systems: From Bits ...
Sanjay Patel & Yale N. Patt
Head First Design Patterns
Eric Freeman & Elisabeth Freeman & Kathy Sierra & Bert Bates
The C Programming Language
Brian W. Kernighan & Dennis M. Ritchie
Introduction to Java Programming: Comprehensive Version
Y. Daniel Liang
iOS Application Security
David Thiel
Unauthorised Access: Physical Penetration Testing for IT Security ...
Wil Allsopp
The Smart Girl's Guide to Privacy: Practical Tips for Staying ...
Violet Blue
The Practice of Network Security Monitoring: Understanding Incident ...
Richard Bejtlich
The Car Hacker's Handbook: A Guide for the Penetration Tester
Craig Smith
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
The Art of Memory Forensics: Detecting Malware and Threats in ...
Michael Hale Ligh
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Social Engineering: The Art of Human Hacking
Christopher Hadnagy
Security Engineering: A Guide to Building Dependable Distributed ...
Ross J. Anderson
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Pro Vim
Mark McDonnell
Pro Linux High Availability Clustering
Sander van Vugt
Pro Git
Scott Chacon
Pro Docker
Deepak Vohra
Practical Linux Topics
Chris Binnie
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Practical Forensic Imaging: Securing Digital Evidence With Linux ...
Bruce Nikkel
PoC or GTFO
Manul Laphroaig
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman
Nginx HTTP Server - Third Edition
Clement Nedelcu
Metasploit: The Penetration Tester's Guide
David Kennedy & Devon Kearns
Introducing Linux Distros
Jose Dieguez Castro
Introducing Ethereum and Solidity: Foundations of Cryptocurrency ...
Chris Dannen
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Game Hacking: Developing Autonomous Bots for Online Games
Nick Cano
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Certified OpenStack Administrator Study Guide
Andrey Markelov
CEH V9: Certified Ethical Hacker Version 9 Study Guide
Sean-Philip Oriyano
Beginning Ubuntu for Windows and Mac Users
Nathan Haines
Applied Cryptography: Protocols, Algorithms and Source Code ...
Ansible: From Beginner to Pro
Michael Heap
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Absolute OpenBSD: UNIX for the Practical Paranoid
Michael W. Lucas