Books
In this section we showcase some books that could be of interest to IT-security professionals, tech enthusiasts and even sci-fi fans. There are (non-affiliate) links that let you buy each book from Amazon.
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing‘}”>The Hacker Playbook 2: Practical Guide To Penetration Testing
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters‘}”>Black Hat Python: Python Programming for Hackers and Pentesters
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation‘}”>Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory‘}”>The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory