Want Sweet Deals? Join our Mailing List

Hacking & Computer Security

From Day Zero to Zero Day

By Eugene Lim

Find security holes before the bad guys do.

Microcontroller Exploits

By Travis Goodspeed

A deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.

Serious Cryptography, 2nd Edition

By Jean-Philippe Aumasson

Serious Cryptography, 2nd edition, is a practical guide to the past, present, and future of cryptographic systems and algorithms.

Cybersecurity Tabletop Exercises

By Robert Lelewski and John Hollenberger

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

The Art of Mac Malware, Volume 2

Patrick Wardle

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

Black Hat Bash

By Nick Aleks and Dolev Farhi

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!

Windows Security Internals

James Forshaw

Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.

Evasive Malware

By Kyle Cucci

The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.

Newsletter Subscription

We’ll send you sweet deals on upcoming books and let you know when new books are released. We’ll never sell, give away, or use your personal information for nefarious purposes. Choose the categories you’re interested in (check as many as you’d like):