Atticking Network Protocols Rootkits and Bootkis Practical Malware Analysis Malware Data Science Professional Red Teaming The Hardware Hacker The Book Of GNS3 Network Know-how Learning Malware Analysis Mastering Malware Analysis The Shellcoder's Handbook 1st The Shellcoder's Handbook 2nd Hacking The Art of Exploitation w/CD Hacking The Art of Exploitation 2nd Reversing Secrets of Reverse Engineerig A Guide to Kernel Exploitation The IDA Pro Book Practical Reverse Engineering