The Art of Mac Malware, Volume 2
Patrick Wardle
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Cybersecurity Tabletop Exercises: From Planning to Execution
Robert Lelewski & John Hollenberger
Black Hat Bash
Dolev Farhi & Nick Aleks
Metasploit
David Kennedy, et al.
Serious Cryptography
Jean-Philippe Aumasson