51
C++反汇编与逆向分析技术揭秘(第2版)
钱林松; 张延清
52
資訊戰爭:入侵政府網站、竊取國家機密、假造新聞影響選局,網路已成為繼原子彈發明後最危險的完美武器 = The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
桑格 (David E. Sanger) 著; 但漢敏 譯
53
Hacking Android
Terry D. Clark
54
CTF特训营:技术详解、解题方法与竞赛技巧
FlappyPig战队
55
OSINT Techniques - Resources for Uncovering Online Information 10th Edition
Michael Bazzell
56
Cyberjutsu: Cybersecurity for the Modern Ninja
Ben McCarty
57
逆向工程核心原理
[韩] 李承远
58
Guide to Firewalls and VPNs
Michael E. Whitman; Herbert J. Mattord; Andrew Green
59
Malware Data Science: Attack Detection And Attribution
Joshua Saxe; Hillary Sanders
60
python黑帽子:黑客与渗透测试编程之道
[美]Justin Seitz 著; 孙松柏 / 李聪 / 润秋 译
61
加密与解密(第4版)
段钢
62
白帽子讲Web安全
吴翰清
63
Digital Forensics
André Årnes (Editor)
64
Hacking with Kali Linux: A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing
Jack Mathew [Mathew; Jack]
65
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
66
Python灰帽子-黑客与逆向工程师的Python编程之道
Justin.Seitz
67
Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking with Kali Linux
Jim Kou
68
How to Hack Like a GHOST: A detailed account of a breach to remember
Sparc FLOW
69
Bug Bounty Playbook
Ghostlulz
70
黑客工具全攻略
天河文化
71
Computer Programming and Cyber Security for Beginners - Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking
Zach Codings
72
MALWARE DATA SCIENCE Attack Detection and Attribution
Joshua Saxe
73
Hacklog Volume 2 Web Hacking: Handbook on IT Security and Ethical Hacking
Stefano Novelli; Marco Silvestri
74
Chaos Engineering: System Resiliency in Practice
Casey Rosenthal; Nora Jones
75
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Jasper van Woudenberg; Colin O'Flynn
76
Foundations of Information Security: A Straightforward Introduction
Jason Andress
77
Computer Security Principles and Practice 5th Edition
William Stallings; Lawrie Brown
78
The Art of Cyberwarfare An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime
Jon DiMaggio
79
Black Hat Rust Deep dive into offensive security with the Rust programming language
Sylvain Kerkour
80
Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition
James E Fitzpatrick; Joseph G Morelli
81
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong
82
Cyber Security Incident Management Guide
Centre For Cyber Security Belgium
83
Ethical Hacking with Python: Build 35+ hacking tools with Python programming
Abdeladim Fadheli
84
Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow
Karnel; Erickson
85
The Hacker Playbook Practical Guide To Penetration Testing
Peter Kim
86
ccna 200-301 practice exam questions
CCNA
87
Extreme Privacy: What It Takes to Disappear
Michael Bazzell
88
Python Básico para Hackers y Pentester
compu
89
Hackear al hacker
Roger A. Grimes
90
NETWORKING HACKING: Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware.
Karnel Erickson
91
白帽子讲Web安全
吴翰清
92
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
Lance Henderson
93
Cybersecurity for Beginners
Meeuwisse Rauf.
94
Basic Security Testing with Kali Linux 2
Daniel W. Dieterle
95
Penetration Testing with Kali Linux - PEN-200 2023
Offensive Security
96
CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 (Sybex Study Guide), 9th Edition
Mike Chapple & David Seidl
97
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
Occupytheweb
98
黑客攻防从入门到精通(加密与解密篇)2020
明月工作室; 宗立波
99
Hacking: the art of exploitation, 2nd ed. (original PDF)
Jon Erickson
100
Cybersecurity For Dummies. Palo Alto Networks Edition
Miller L.C.