Foraging for Survival
Douglas Boudreau
DEATH IN SPACE
Unknown
Thorns
ravnos
The Wild West (1997)
Acr17D5.tmp
thecarhackershand[..]
The pfSense Book
Netgate
Quick Start Guide
John Schember
README
Threat Modeling
Adam Shostack
Social Engineering
Christopher Hadnagy
Cybersecurity and Third-Party Risk
Gregory C. Rasner
Tribe of Hackers Blue Team
Marcus J. Carey & Jennifer Jin
The Art of Deception
Kevin D. Mitnick & William L. Simon
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Cryptography Apocalypse
Roger A. Grimes
The Art of Attack
Maxie Reynolds
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Applied Cryptography, Second Edition
Bruce Schneier
Liars and Outliers
Tribe of Hackers Security Leaders
Tribe of Hackers
Hacking Multifactor Authentication
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Tribe of Hackers Red Team
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker’s Handbook
Dafydd Stuttard & Marcus Pinto
Investigating Cryptocurrencies
Nick Furneaux
Kali Linux Penetration Testing Bible
Gus Khawaja
The Pentester Blueprint
Phillip L. Wylie & Kim Crawley
Transformational Security Awareness
Perry Carpenter
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
Unauthorised Access
Allsopp , Wil
The Liquidsoap book
Samuel Mimram; Romain Beauxis
Windows PowerShell Tutorial for Beginners
netwrix