It is all about bug hunting, vulnerability research, software exploitation
Favorites: Blog Reading https://googleprojectzero.blogspot.hk/
Reverse Engineering and Exploitation::Conference https://recon.cx/ https://infiltratecon.com/
Reverse Engneering::IDA::Python https://researchcenter.paloaltonetworks.com/2015/12/using-idapython-to-make-your-life-easier-part-1/ https://researchcenter.paloaltonetworks.com/2015/12/using-idapython-to-make-your-life-easier-part-2/ https://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-3/ https://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-4/ https://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-5/ https://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-6/
Books:: Art of Software Security Assessment https://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426
Hacking - Art of Exploitation https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/ref=pd_lpo_sbs_14_img_2?_encoding=UTF8&psc=1&refRID=CRKHMPAZHXM6X4ZA6NTF
Fuzzing https://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/0321446119/ref=sr_1_1?s=books&ie=UTF8&qid=1518357186&sr=1-1&keywords=Fuzzing https://www.amazon.com/Fuzzing-Software-Security-Assurance-Information/dp/1596932147/ref=pd_sbs_14_4?_encoding=UTF8&pd_rd_i=1596932147&pd_rd_r=Y6ECH5C1ZTBSP6QKY7GJ&pd_rd_w=kvUlx&pd_rd_wg=XE42y&psc=1&refRID=Y6ECH5C1ZTBSP6QKY7GJ