- Advanced Penetration Testing
- Applied Cryptography Protocols Algorithms
- Art of Memory Forensics
- Cryptography Apocalypse
- Cryptography Engineering Design
- Cybersecurity Blueteam Toolkit
- Investigating Cryptocurrencies
- Kali Linux Revealed 1st
- Malware Analysis Cookbook
- Practical Reverse Engineering x86 x64
- Secrets and Lies
- Secrets of Reverse Engineering
- Security Engineering a Guide to Building Dependable Distributed Systems
- Shellcoders handbook Discovering and Exploiting Security Holes
- Social Engineering the Science of Human Hacking 2nd Edition
- Threat Modeling Designing for Security
- Tribe of Hackers Cybersecurity Advice from the Best Hackers in the World
- Tribe of Hackers Redteam Tribal Knowledge from the Best in Offensive Cybersecurity
- Web Application Hackers Handbook Finding and Exploiting Security Flaws
- We Have Root Even More Advice from Schneier on Security
- Wireshark for Security Professionals
Hidden Content You'll be able to see the hidden content once you reply to this topic or upgrade your account.
Decluttering For Dummies
Knitting For Dummies
Bike Repair and Maintenance For Dummies
Raising Goats For Dummies
Electronics Projects For Dummies
Homebrewing For Dummies
Home Maintenance For Dummies
Urban Gardening For Dummies
Pairing Food and Wine For Dummies
Auto Repair For Dummies
Cooking Basics For Dummies
Wilderness Survival For Dummies
Woodworking For Dummies
Workouts For Dummies
Home Decorating For Dummies
Bartending For Dummies
Hobby Farming For Dummies
How To Fix Everything For Dummies
Fermenting For Dummies
Motorcycling For Dummies
Starting a Business All-in-One For Dummies
Home Winemaking For Dummies
Hidden Content You'll be able to see the hidden content once you reply to this topic or upgrade your account.