You are on page 1of 1

Practical Binary Analysis

Learning Liux Binary Analysis


Atticking Network Protocols
Rootkits and Bootkis
Practical Malware Analysis
Malware Data Science
Professional Red Teaming
The Hardware Hacker
The Book Of GNS3
Network Know-how
Learning Malware Analysis
Mastering Malware Analysis
The Shellcoder's Handbook 1st
The Shellcoder's Handbook 2nd
Hacking The Art of Exploitation w/CD
Hacking The Art of Exploitation 2nd
Reversing Secrets of Reverse Engineerig
A Guide to Kernel Exploitation
The IDA Pro Book
Practical Reverse Engineering

You might also like