- Permanent Record by Edward Snowden
- Countdown to Zero Day Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter
- Dark Territory The Secret History of Cyber War by Fred Kaplan.
- Comptia Security+ Get Certified Get Ahead Sy0-501 Study Guide by Darril Gibson
- The Art of Invisibility. The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick.
- Ghost in the Wires. My Adventures as the World’s Most Wanted Hacker by Kevin Mitnick, Steve Wozniak, William L. Simon.
- The Cuckoo’s Egg by Clifford Stoll.
- Snow Crash by Neal Stephenson.
- Sandworm. A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers by Andy Greenberg
- Hacking The Art of Exploitation by Jon Erickson
- Kingpin. How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
- Future Crimes Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It by Marc Goodman
- The Code Book. The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh
- Spam Nation. The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door by Brian Krebs.
- Cyberwar. The Next Threat to National Security & What to Do About It by Richard A. Clarke, Robert Knake.
- Practical Malware Analysis. The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski
- The Perfect Weapon. War, Sabotage, and Fear in the Cyber Age by David E. Sanger.
- Cybersecurity and Cyberwar. What Everyone Needs to Know by P.W. Singer and Allan Friedman.
- Data and Goliath. The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier.
- The Art of Deception. Controlling the Human Element of Security by Kevin D. Mitnick.
- American Kingpin. The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton.
- Cryptonomicon by Neal Stephenson.
- Red Team Field Manual (RTFM) by Ben Clark.
- The Web Application Hacker’s Handbook Finding and Exploiting Security Flaws by Dafydd Stuttard.
- Social Engineering. The Science of Human Hacking by Hadnagy
- The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, William L. Simon.
- Tribe of Hackers. Cybersecurity Advice from the Best Hackers in the World by Marcus J Carey, Jennifer Jin.
- 28. The Hacker Playbook 2. Practical Guide To Penetration Testing by Peter Kim.
- The Phoenix Project. A Novel About IT, DevOps, and Helping Your Business Win by Gene Kim, Kevin Behr, George Spafford.
- No Place to Hide. Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald
- The Innovators. How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution by Walter Isaacson.
- We Are Anonymous. Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson.
- Security Engineering. A Guide to Building Dependable Distributed Systems 2ed by Ross J. Anderson.
- The Hacker Playbook 3. Practical Guide to Penetration Testing by Peter Kim.
- Secrets and Lies. Digital Security in a Networked World by Bruce Schneier.
- 36. Black Hat Python. Python Programming for Hackers and Pentesters by Justin Seitz.
- Click Here to Kill Everybody. Security and Survival in a Hyper-connected World by Bruce Schneier.
- Applied Cryptography. Protocols, Algorithms, and Source Code in C by Bruce Schneier.
- Mindf*ck. Cambridge Analytica and the Plot to Break America by Christopher Wylie.
- The Age of Surveillance Capitalism. The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff
- Open Source Intelligence Techniques. Resources for Searching and Analyzing Online Information by Michael Bazzell.
- Penetration Testing. A Hands-On Introduction to Hacking by Georgia Weidman.
- The First Digital World War by Mark Bowden.
- Cracking the Coding Interview. 189 Programming Questions and Solutions by Gayle Laakmann McDowell.
- Lights Out: A Cyberattack: A Nation Unprepared. Surviving the Aftermath by Ted Koppel.
- Hackers. Heroes of the Computer Revolution by Steven Levy.
- Blue Team Field Manual (BTFM) by Alan J White
- Nmap Network Scanning. The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon.
- The Hacker Playbook. Practical Guide To Penetration Testing by Peter Ki.
- @War. The Rise of the Military-Internet Complex by Shane Harris.
- Malware Analyst’s Cookbook and DVD. Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard
- Metasploit. The Penetration Tester’s Guide by David Kennedy, Jim O’Gorman, Devon Kearns, Mati Aharoni
- Threat Modeling Designing for Security by Adam Shostac
- Crypto. How the Code Rebels Beat the Government–Saving Privacy in the Digital Age by Steven Levy.
- Automate the Boring Stuff with Python. Practical Programming for Total Beginners by Al Sweigart.
- Gray Hat Hacking. The Ethical Hacker’s Handbook by Allen Harper, Daniel Regalado, et al.
- Python Crash Course, 2nd Edition. A Hands-On, Project-Based Introduction to Programming by Eric Matthes.
- Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous by Gabriella Coleman.
- The Ultimate Unofficial Encyclopedia for Minecrafters. An A – Z Book of Tips and Tricks the Official Guides Don’t Teach You by Megan Miller.
- The Industries of the Future by Alec Ross.
- The Basics of Hacking and Penetration Testing. Ethical Hacking and Penetration Testing Made Easy by Patrick Engebretson.
- Cybersecurity: The Beginner’s Guide. A comprehensive guide to getting started in cybersecurity by Dr. Erdal Ozkaya.
- Cryptography Engineering. Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, et al.
- Windows Internals, Part 1 User Mode by Pavel Yosifovich, Mark E. Russinovich, et al.
- Comptia Network+ Certification All-In-One Exam Guide, Seventh Edition (Exam N10-007) by Mike Meyers.
- The Practice of Network Security Monitoring. Understanding Incident Detection and Response by Richard Bejtlich.
- Wtf Is My Password. Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, Logbook to Protect Usernames and Passwords, Password Notebook, Password Book Small 6 X 9 by Booki Nova.
- Minecraft. Guide to Creation by Mojang Ab.
- The Hacked World Order. How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age by Adam Segal.
- This Machine Kills Secrets. How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information by Andy Greenberg.
- The Art of Memory Forensics. Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters.
- The IDA Pro Book. The Unofficial Guide to the World’s Most Popular Disassembler by Chris Eagle 74.
- The Fifth Domain. Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake.
- Blue Team Handbook: Incident Response Edition. A condensed field guide for the Cyber Security Incident Responder. By Don Murdoch GSE.
- The Cybersecurity Dilemma. Network Intrusions, Trust, and Fear in the International System by Ben Buchanan.
- The Hardware Hacker. Adventures in Making and Breaking Hardware by Andrew Bunnie Huang.
- The Dark Net. Inside the Digital Underworld by Jamie Bartlett.
- Violent Python. A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O’Connor.
- Cybersecurity Essentials by Charles J. Brooks, Christopher Grow, et al.
- Dark Mirror. Edward Snowden and the American Surveillance State by Barton Gellman
- CISSP All-in-One Exam Guide by Shon Harris
- Minecraft: Guide Collection. Exploration; Creative; Redstone; The Nether & the End by Mojang Ab
- How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard, Richard Seiersen, Daniel E. Geer Jr., Stuart McClure.
- Password book: A Premium Journal and Logbook to Protect Usernames and Passwords Modern Password Keeper, Vault, Notebook and Online Organizer with … Calligraphy and Hand Lettering Design) by Lettering Design Co.
- Hacked Again by Scott N. Schober
- The Shellcoder’s Handbook. Discovering and Exploiting Security Holes by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
- Cybersecurity for Beginners by Raef Meeuwisse
- Cryptography Apocalypse. Preparing for the Day When Quantum Computing Breaks Today’s Crypto by Roger A. Grimes
- Extreme Privacy. What It Takes to Disappear in America by Michael Bazzell
- Gray Day. My Undercover Mission to Expose America’s First Cyber Spy by Eric O’Neill
- Minecraft. Guide to the Nether & the End by Mojang Ab
- Minecraft. Guide to Redstone by Mojang Ab
- McMafia. A Journey Through the Global Criminal Underworld by Misha Glenny
- CCNA 200-301 Official Cert Guide, Volume 1 by Wendell Odom
- (isc)2 Cissp Certified Information Systems Security Professional Official Study Guide, 8e & Cissp Official (Isc)2 Practice Tests, 2e by Mike Chapple
- Secrets of Reverse Engineering by Eldad Eilam
- Linux Basics for Hackers. Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb
- Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power by David E. Sange
- (isc)2 Cissp Certified Information Systems Security Professional Official Study Guide by Mike Chapple.
- Cryptoconomy by Gary Miliefsky.