Humble Tech Book Bundle: Cybersecurity by Wiley
Humble Bundle
Tier 1
Items
8
Current Value
Price
$1.00

The Art of Deception: Controlling the Human Element of Security
by Kevin D. Mitnick, William L. Simon

Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
by Bruce Schneier

The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition
by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte

Threat Modeling: Designing for Security
by Adam Shostack
Best Price
N/A
N/A

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by Marcus J. Carey, Jennifer Jin

How I Rob Banks: And Other Such Places
by FC Barker

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by Bruce Dang, Alexandre Gazet, Elias Bachaalany
Best Price
N/A
N/A

Taming the Hacking Storm: A Framework for Defeating Hackers and Malware
by Roger A. Grimes
Tier 2
Items
8
Current Value
Price
$18.00

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by Kevin D. Mitnick, William L. Simon

Cryptography Engineering: Design Principles and Practical Applications
by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

Advanced Penetration Testing: Hacking the World's Most Secure Networks
by Wil Allsopp
Best Price
N/A
N/A

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

The Language of Deception: Weaponizing Next Generation AI
by Justin Hutchens
Best Price
N/A
N/A

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
by Jessey Bullock, Jeff T. Parker
Best Price
N/A
N/A

Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
by Vinny Troia
Tier 3
Items
8
Current Value
Price
$25.00

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition
by Dafydd Stuttard, Marcus Pinto

Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition
by Ross Anderson

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by Michael Hale Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Best Price
N/A
N/A

Unauthorised Access: Physical Penetration Testing For IT Security Teams
by Wil Allsopp
Best Price
N/A
N/A

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by Nick Furneaux

x86 Software Reverse-Engineering, Cracking, and Counter-Measures
by Stephanie Domas, Christopher Domas
Best Price
N/A
N/A


