The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Rtfm: Red Team Field Manual
The Hacker Playbook 3: Practical Guide To Penetration Testing
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
C: A Reference Manual, 5th Edition --- Really handy for looking up functions and stuff, for example the srand function.
The Standard C Library
TCP/IP Illustrated, Volume 1 though Volume 3
©2013-2023 All Rights Reserved.