101

Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
Barry L. Williams
102

Hacking ético con herramientas Python
José Manuel Ortega Candel [Candel; José Manuel Ortega]
103

Advanced Web Attacks and Exploitation 1.5
Offensive Security
104

The Social Engineer’s Playbook
Jeremiah Talamantes
105

Building a Cyber Risk Management Program: Evolving Security for the Digital Age
Brian Allen; Brandon Bapst; Terry Allan Hicks
106

Python for Cybersecurity: Using Python for Cyber Offense and Defense
Howard E. Poston; III
107

Social Network Forensics, Cyber Security, and Machine Learning
P. Venkata Krishna; Sasikumar Gurumoorthy; Mohammad S. Obaidat
108

ISO 27001 controls – A guide to implementing and auditing
Bridget Kenyon
109

Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
110

Black Hat Python: Programação Python para Hackers e Pentesters
Justin Seitz
111

Security from Zero: Practical Security for Busy People
Eric Higgins
112

Foundations of Information Security: A Straightforward Introduction
Jason Andress
113

Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
114

Kali Linux渗透测试的艺术(异步图书) (信息安全技术丛书)
Lee Allen Tedi Heriyanto & Shakeel Ali [Lee Allen Tedi Heriyanto]
115

Cyber-Security And Information Warfare
Nicholas J. Daras
116

El libro blanco del hacker
Pablo Gutiérrez Salazar
117

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Joshua Holden
118

Python安全攻防 渗透测试实战指南 2020
吴涛; 方嘉明; 吴荣德; 徐焱
119

CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
Ric Messier
120

CISA Review Manual, 27th Edition
ISACA
121

0day安全软件漏洞分析技术(第二版)
王清,张东辉,周浩,王继刚,赵双
122

Social media hacking: Hack Facebook, WhatsApp, Instagram, Twitter accounts
Shekhar Mishra
123

DNS Security For Dummies
Joshua M Kuo; Robert Nagy; Cricket Liu
124

CISSP: 4 in 1- Beginner's Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
Jones; Daniel
125

Data security in cloud computing
Kumar; Vimal
126

HACKING: Become The Ultimate Hacker - Computer Virus, Cracking, Malware, IT Security
Joseph Connor
127

《黑客渗透笔记》.pdf
《黑客渗透笔记》.pdf
128

安卓Frida逆向与抓包实战
陈佳林
129

ISO/IEC 27001:2022: Information security, cybersecurity and privacy protection — Information security management systems — Requirements
ISO
130

Hacking With Kali Linux the Ultimate Beginners Guide: Learn and Practice the Basics of Ethical Hacking and Cybersecurity
Clark Ramon [Ramon; Clark]
131

300 Cyber Security Interview Questions
300 Cyber Security Interview Questions CybIT
132

Kali Linux高级渗透测试(原书第3版)
维杰·库马尔·维卢 (Vijay Kumar Velu); 罗伯特·贝格斯 (Robert Beggs)
133

x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas; Christopher Domas
134

Wireless Hacking With Kali Linux: Begin to Learn Fast How to Hack any Wireless Networks With this Penetration
Eugene Delgado
135

Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
Troncone; Paul; Albing Ph.D.; Carl
136

Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques
Vinny Troia
137

精通脚本黑客
曾云好
138

Bug Bounty Playbook v2
Alex Thomaz; Ghostlulz
139

Cyber Defense Mechanisms: Security, Privacy, and Challenges
Gautam Kumar; Dinesh Kumar Saini; Nguyen Ha Huy Cuong; (eds.)
140

Pentest em redes sem fio
Daniel Moreno
141

Cybersecurity All-in-One For Dummies
Joseph Steinberg; Kevin Beaver; Ted Coombs; Ira Winkler
142

Information Security: Foundations, technologies and applications
Ali Ismail Awad; Michael Fairhurst
143

Kali Linux Wireless Penetration Testing Beginner's Guide -Third Edition
Cameron Buchanan; Vivek Ramachandran
144

Practical Social Engineering: A Primer for the Ethical Hacker
Joe Gray
145

Advanced Web Attacks and Exploitation
F3thinker !
146

从0到1:CTFer成长之路
Nu1L战队 编著
147

The Red Team Guide
Peerlyst
148

The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski
149

THE ADVANCED PENETRATING TESTING : Step-By-Step Guide To Ethical Hacking and Penetration Testing Made Easy
JEFF; DR. PATRICK
150

Basic Security Testing with Kali Linux
Daniel W. Dieterle