Cybersecurity

Exploitation

Penetration Testing: A Hands-On Introduction to Hacking
Mastering Metasploit - Second Edition
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Advanced penetration Testing: Hacking the Worlds Most Secure Networks
The Shellcoders Handbook: Discovering and Exploiting Security Holes
Software Security: Building Security In
Secure Coding in C and C++ - Second Edition
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Professional Java Security (Programmer to Programmer)
Inside Java2 Platform Security: Architecture, API Design and Implementation
Obfuscated C and Other Mysteries

Networks

The Web Application Hackers Handbook: Finding and Exploiting Security Flaws
CEH Certified Ethical Hacker All-in-One Exam Guide
Hacking Exposed 7: Network Security Secrets and Solutions
The Browser Hackers Handbook
Attacking Network Protocols: A hackers Guide to Capture, Analysis, and Exploitation
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Rtfm: Red Team Field manual
SQL Injection Attacks and Defence
XSS Attacks: Cross Site Scripting Exploits and Defense
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions

Reverse Engineering

Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
Reversing: Secrets of Reverse Engineering
Learning Linux Binary Analysis
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Antivirus Hackers Handbook
The IDA Pro Book: The Unofficial Guide to the Worlds Most Popular Disassembler

Wireless

Hacking Exposed Wireless: Wireless Security Secrets and Solutions
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Hacking Exposed Unified COmmunications and VoIP Security Secrets and Solutions
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Mobile

The Mobile Applicaiton Hackers Handbook
Android Hackers Handbook
Android Security Internals: An In-Depth Guide to Androids Security Architecture
IOS Application Security: The Definitive GUide for Hackers and Developers
IOS Hackers Handbook
Learning IOS Penetration Testing

IoT

IOT Hackers Handbook: An Ultimate Guide to Hacking the Internet of Things and Learning IoT Security
Practical Internet of Things Security
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots: Tracking Hackers

Scripting

Black Hat Python: Python Programing for Hackers and Pentesters
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Violen Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Linux Shell Scripting Cookbook
Linux Kernel Development
Learn Windows PowerShell in a Month of Lunches

Rootkits

Managed Code Rootkits: Hooking into Runtime Environments
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Designing BSD Rootkits: An Introduciton to Kernel Hacking

Cryptography

Serious Cryptography: A Practical Introduction to Modern Encryption
Understanding Cryptography: A Textbook for Students and Practitioners
Hash Crack: Password Cracking Manual
PoC or GTFO

Hardware

The Hardware Hacker: Adventures in Making and Breaking Hardware
Hacking the Xbox: An Introduction to Reverse Engineering
The Car Hackers Handbook: A Guide for the Penetration Tester
Hardware Protection through Obfuscation
Hardware Security: Design, Threats, and Safeguards

Physics

Coming Soon

More to come.