Privileged Attack Vectors
Morey J. Haber
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Cybersecurity Incident Response
Eric C. Thompson
Learning Domain-Driven Design
Vlad Khononov
Effective Programming
Jeff Atwood