Serious Cryptography
Jean-Philippe Aumasson
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
Metasploit
David Kennedy, et al.
Cybersecurity Tabletop Exercises: From Planning to Execution
Robert Lelewski & John Hollenberger
Black Hat Bash
Dolev Farhi & Nick Aleks
The Art of Mac Malware, Volume 2
Patrick Wardle