Applied Cryptography
Bruce Schneier
Hands-On Data Structures and Algorithms with Python
Dr. Basant Agarwal & Benjamin Baka
Hacking the Cable Modem
DerEngel
Web Penetration Testing with Kali Linux
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Threat Modeling
Adam Shostack
Secrets and Lies
VCA-DCV VMware Certified Associate on vSphere Study Guide
Robert Schmidt & Dane Charlton
Shell Scripting
Steve Parker
Linux Bible
Christopher Negus
Professional Linux Kernel Architecture
Wolfgang Mauerer
Beginning Linux Programming
Neil Matthew & Richard Stones
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Teach Like a Champion 3.0: 63 Techniques That Put Students on ...
Doug Lemov
Investigating Cryptocurrencies
Nick Furneaux
Reversing
Eldad Eilam
Assembly Language Step-by-Step
Jeff Duntemann
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Linux Server Security
Chris Binnie
The Shellcoder's Handbook
Chris Anley & John Heasman & Felix Lindner & Gerardo Richarte
Advanced Penetration Testing
Wil Allsopp