Networking for Systems Administrators (IT Mastery) (Volume 5)
Michael W Lucas
Learning AWS
Aurobindo Sarkar & Amit Shah
Docker Cookbook
Sébastien Goasguen
Docker Deep Dive
Nigel Poulton
Securing DevOps: Safe Services in the Cloud
Julien Vehent
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin
Implementing Cybersecurity: A Guide to the National Institute ...
Anne Kohnke & Ken Sigler & Dan Shoemaker
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
IT Security Risk Control Management: An Audit Preparation Plan
Raymond Pompon
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Network Security Assessment: Know Your Network
Chris McNab
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Secure Your Node.js Web Application: Keep Attackers Out and ...
Karl Duuna
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Selinux Cookbook
Sven Vermeulen
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS ...
Ivan Ristic
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
Intellectual Property and Open Source
van Lindberg
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Cryptography in C and C++
Michael Welschenbach
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
Apache Security
Network Security Essentials: Applications and Standards
William Stallings
Modsecurity 2.5
Magnus Mischel
Cryptography and Network Security: Principles and Practice (4th ...
Gitolite Essentials
Sitaram Chamarty
Ethical Hacking and Countermeasures: Web Applications and Data ...
Ec-Council
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Computational Number Theory and Modern Cryptography
Song Y. Yan
What Is Computer Science?: An Information Security Perspective
Daniel Page & Nigel Smart
The Privacy Engineer’s Manifesto: Getting From Policy to Code ...
Michelle Finneran Dennedy & Jonathan Fox & Thomas Finneran
Network Security Through Data Analysis: Building Situational ...
Michael Collins
Vmware Vcloud Security
Prasenjit Sarkar
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Web Penetration Testing With Kali Linux
Joseph Muniz & Aamir Lakhani
Network Security: A Practical Approach
Jan L. Harrington
OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL ...