WildFly Cookbook
Luigi Fugaro
Mostly Harmless
Douglas Adams
The Hitchhiker's Guide to the Galaxy (5)
RHSA III
Wander Boessenkool, Chen Chang, Will Dinyes, George Hacker, ...
Red Hat System Administration (3)
OpenStack Operations Guide
Tom Fifield & Lorin Hochstein & Jonathan Proulx & Everett Toews & Diane Fleming & Joe Topjian & Anne Gentle
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Apache Security
Ivan Ristic
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS ...
Computational Number Theory and Modern Cryptography
Song Y. Yan
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
Cryptography in C and C++
Michael Welschenbach
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ec-Council
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ethical Hacking and Countermeasures: Web Applications and Data ...
Gitolite Essentials
Sitaram Chamarty
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Implementing Cybersecurity: A Guide to the National Institute ...
Anne Kohnke & Ken Sigler & Dan Shoemaker
Intellectual Property and Open Source
van Lindberg
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon
Modsecurity 2.5
Magnus Mischel
Network Security Assessment: Know Your Network
Chris McNab
Network Security Essentials: Applications and Standards
Network Security Through Data Analysis: Building Situational ...
Michael Collins
Network Security: A Practical Approach
Jan L. Harrington
OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL ...
The Privacy Engineer’s Manifesto: Getting From Policy to Code ...
Michelle Finneran Dennedy & Jonathan Fox & Thomas Finneran
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
Secure Your Node.js Web Application: Keep Attackers Out and ...
Karl Duuna
Securing DevOps: Safe Services in the Cloud
Julien Vehent
Selinux Cookbook
Sven Vermeulen
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
Vmware Vcloud Security
Prasenjit Sarkar
Web Penetration Testing With Kali Linux
Joseph Muniz & Aamir Lakhani
What Is Computer Science?: An Information Security Perspective
Daniel Page & Nigel Smart