Humble Tech Book Bundle: Cybersecurity by Wiley

For more information or to order this bundle, click on any of the images below. You will be redirected to this bundle on humblebundle.com

For 1.07 EUR or more you will get:

Threat Modeling: Designing for Security
The Art of Deception: Controlling the Human Element of Security
How I Rob Banks: And Other Such Places
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

By adding 15.47 EUR more (16.54 EUR total) you will get:

Advanced Penetration Testing: Hacking the World's Most Secure Networks
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
The Language of Deception: Weaponizing Next Generation AI
Cryptography Engineering: Design Principles and Practical Applications
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Cybersecurity Blue Team Toolkit
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

By adding 6.44 EUR more (22.98 EUR total) you will get:

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Unauthorised Access: Physical Penetration Testing For IT Security Teams
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Applied Incident Response
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition