| Item name | Item Type |
| The Active Defender: Immersion in the Offensive Security Mindset | ebook |
| Alice and Bob Learn Application Security | ebook |
| The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers | ebook |
| The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry | ebook |
| Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts | ebook |
| How I Rob Banks: And Other Such Places | ebook |
| If It's Smart, It's Vulnerable | ebook |
| Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security | ebook |
| Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them | ebook |
| Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT | ebook |
| Python for Cybersecurity: Using Python for Cyber Offense and Defense | ebook |
| The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer | ebook |
| Software Transparency: Supply Chain Security in an Era of a Software-Driven Society | ebook |
| The Art of Deception: Controlling the Human Element of Security | ebook |
| Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks | ebook |
| Threats: What Every Engineer Should Learn From Star Wars | ebook |
| Trust in Computer Systems and the Cloud | ebook |
| Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise | ebook |