Cybersecurity Incident Response
Eric C. Thompson
Firewalls Don't Stop Dragons
Carey Parker
Network Attacks and Exploitation
Matthew Monte
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
97 Things Every Application Security Professional Should Know
Reet Kaur and Yabing Wang
40 Algorithms Every Programmer Should Know
Imran Ahmad