- Black Hat Go: Go Programming For Hackers and Pentesters
![](https://images-na.ssl-images-amazon.com/images/I/51Eznheb+3L._SX376_BO1,204,203,200_.jpg)
2) Real-World Bug Hunting: A Field Guide to Web Hacking
![](https://images-na.ssl-images-amazon.com/images/I/51p7pI4f7HL._SX376_BO1,204,203,200_.jpg)
3) Web Security for Developers: Real Threats, Practical Defense
![](https://images-na.ssl-images-amazon.com/images/I/51mjQvgzz4L._SX376_BO1,204,203,200_.jpg)
4) The Linux Command Line
![](https://images-na.ssl-images-amazon.com/images/I/51-T4ZwKduL._SX376_BO1,204,203,200_.jpg)
5) The Car Hacker’s Handbook
![](https://images-na.ssl-images-amazon.com/images/I/51itpsaLlfL._SX376_BO1,204,203,200_.jpg)
6) Rootkits and Bootkits
![](https://images-na.ssl-images-amazon.com/images/I/51l1OUOmQwL._SX376_BO1,204,203,200_.jpg)
7) Practical Malware Analysis
![Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software](https://m.media-amazon.com/images/I/818MGwkrHFL._AC_UY218_.jpg)
8) Metasploit
![](https://images-na.ssl-images-amazon.com/images/I/51X+fMi346L._SX376_BO1,204,203,200_.jpg)
9) Hacking
![](https://images-na.ssl-images-amazon.com/images/I/61WRz4V+ADL._SX383_BO1,204,203,200_.jpg)