Advanced Penetration Testing
Wil Allsopp
Applied Cryptography
Bruce Schneier
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Cryptography Apocalypse
Roger A. Grimes
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Investigating Cryptocurrencies
Nick Furneaux
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
REVERSING: SECRETS OF REVERSE ENGINEERING
Eldad Eilam
Secrets and Lies
Security Engineering
Ross J. Anderson
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Social Engineering
Christopher Hadnagy
Threat Modeling
Adam Shostack
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers Red Team
We Have Root
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
XML Schema Essentials
R. Allen Wyke & Andrew Watt