Black Hat Bash
Dolev Farhi & Nick Aleks
Cybersecurity Tabletop Exercises: From Planning to Execution
Robert Lelewski & John Hollenberger
Metasploit
David Kennedy, et al.
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Serious Cryptography
Jean-Philippe Aumasson
The Art of Mac Malware, Volume 2
Patrick Wardle