51

C++反汇编与逆向分析技术揭秘(第2版)
钱林松; 张延清
52

資訊戰爭:入侵政府網站、竊取國家機密、假造新聞影響選局,網路已成為繼原子彈發明後最危險的完美武器 = The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
桑格 (David E. Sanger) 著; 但漢敏 譯
53

Hacking Android
Terry D. Clark
54

CTF特训营:技术详解、解题方法与竞赛技巧
FlappyPig战队
55

OSINT Techniques - Resources for Uncovering Online Information 10th Edition
Michael Bazzell
56

Cyberjutsu: Cybersecurity for the Modern Ninja
Ben McCarty
57

逆向工程核心原理
[韩] 李承远
58

Guide to Firewalls and VPNs
Michael E. Whitman; Herbert J. Mattord; Andrew Green
59

Malware Data Science: Attack Detection And Attribution
Joshua Saxe; Hillary Sanders
60

python黑帽子:黑客与渗透测试编程之道
[美]Justin Seitz 著; 孙松柏 / 李聪 / 润秋 译
61

加密与解密(第4版)
段钢
62

白帽子讲Web安全
吴翰清
63

Digital Forensics
André Årnes (Editor)
64

Hacking with Kali Linux: A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing
Jack Mathew [Mathew; Jack]
65

Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
66

Python灰帽子-黑客与逆向工程师的Python编程之道
Justin.Seitz
67

Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking with Kali Linux
Jim Kou
68

How to Hack Like a GHOST: A detailed account of a breach to remember
Sparc FLOW
69

Bug Bounty Playbook
Ghostlulz
70

黑客工具全攻略
天河文化
71

Computer Programming and Cyber Security for Beginners - Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking
Zach Codings
72

MALWARE DATA SCIENCE Attack Detection and Attribution
Joshua Saxe
73

Hacklog Volume 2 Web Hacking: Handbook on IT Security and Ethical Hacking
Stefano Novelli; Marco Silvestri
74

Chaos Engineering: System Resiliency in Practice
Casey Rosenthal; Nora Jones
75

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Jasper van Woudenberg; Colin O'Flynn
76

Foundations of Information Security: A Straightforward Introduction
Jason Andress
77

Computer Security Principles and Practice 5th Edition
William Stallings; Lawrie Brown
78

The Art of Cyberwarfare An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime
Jon DiMaggio
79

Black Hat Rust Deep dive into offensive security with the Rust programming language
Sylvain Kerkour
80

Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition
James E Fitzpatrick; Joseph G Morelli
81

Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong
82

Cyber Security Incident Management Guide
Centre For Cyber Security Belgium
83

Ethical Hacking with Python: Build 35+ hacking tools with Python programming
Abdeladim Fadheli
84

Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow
Karnel; Erickson
85

The Hacker Playbook Practical Guide To Penetration Testing
Peter Kim
86

ccna 200-301 practice exam questions
CCNA
87

Extreme Privacy: What It Takes to Disappear
Michael Bazzell
88

Python Básico para Hackers y Pentester
compu
89

Hackear al hacker
Roger A. Grimes
90

NETWORKING HACKING: Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware.
Karnel Erickson
91

白帽子讲Web安全
吴翰清
92

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
Lance Henderson
93

Cybersecurity for Beginners
Meeuwisse Rauf.
94

Basic Security Testing with Kali Linux 2
Daniel W. Dieterle
95

Penetration Testing with Kali Linux - PEN-200 2023
Offensive Security
96

CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 (Sybex Study Guide), 9th Edition
Mike Chapple & David Seidl
97

Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
Occupytheweb
98

黑客攻防从入门到精通(加密与解密篇)2020
明月工作室; 宗立波
99

Hacking: the art of exploitation, 2nd ed. (original PDF)
Jon Erickson
100

Cybersecurity For Dummies. Palo Alto Networks Edition
Miller L.C.