Cryptography Apocalypse
Roger A. Grimes
We Have Root
Bruce Schneier
Tribe of Hackers Red Team
Marcus J. Carey & Jennifer Jin
Tribe of Hackers
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Social Engineering
Christopher Hadnagy
Investigating Cryptocurrencies
Nick Furneaux
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Advanced Penetration Testing
Wil Allsopp
Secrets and Lies
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Threat Modeling
Adam Shostack
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Cryptography Engineering
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Security Engineering
Ross J. Anderson
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
XML Schema Essentials
R. Allen Wyke & Andrew Watt
Applied Cryptography
REVERSING: SECRETS OF REVERSE ENGINEERING
Eldad Eilam