- Engineering secure devices (no starch press)
Threat modeling
- Threat modeling - designing for security (wiley)
- Threat modeling (O'reilly)
Cryptography
- Serious cryptography (no starch press)
- Real-World cryptography (manning)
- Secret key cryptography (manning)