• Engineering secure devices (no starch press)

Threat modeling

  • Threat modeling - designing for security (wiley)
  • Threat modeling (O'reilly)

Cryptography

  • Serious cryptography (no starch press)
  • Real-World cryptography (manning)
  • Secret key cryptography (manning)