Puppet 3. 0 Beginner's Guide
John Arundel
The UNIX Programming Environment
Brian Wilson Kernighan & Rob. Pike
PostgreSQL: Up and Running
Regina O. Obe & Leo S. Hsu
Kubernetes Cookbook: Building Cloud Native Applications
Sébastien Goasguen & Michael Hausenblas
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Gitolite Essentials
Sitaram Chamarty
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Network Security Through Data Analysis: Building Situational ...
Michael Collins
The Privacy Engineer’s Manifesto: Getting From Policy to Code ...
Michelle Finneran Dennedy & Jonathan Fox & Thomas Finneran
Secure Your Node.js Web Application: Keep Attackers Out and ...
Karl Duuna
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ec-Council
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ethical Hacking and Countermeasures: Web Applications and Data ...
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Network Security: A Practical Approach
Jan L. Harrington
Implementing Cybersecurity: A Guide to the National Institute ...
Anne Kohnke & Ken Sigler & Dan Shoemaker
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Intellectual Property and Open Source
van Lindberg
Network Security Assessment: Know Your Network
Chris McNab
Modsecurity 2.5
Magnus Mischel
Web Penetration Testing With Kali Linux
Joseph Muniz & Aamir Lakhani
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
What Is Computer Science?: An Information Security Perspective
Daniel Page & Nigel Smart
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL ...
Ivan Ristic
Apache Security
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS ...
Vmware Vcloud Security
Prasenjit Sarkar
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
Network Security Essentials: Applications and Standards
Securing DevOps: Safe Services in the Cloud
Julien Vehent
Selinux Cookbook
Sven Vermeulen
Cryptography in C and C++
Michael Welschenbach
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
Computational Number Theory and Modern Cryptography
Song Y. Yan