RHSA III
Wander Boessenkool, Chen Chang, Will Dinyes, George Hacker, ...
Red Hat System Administration (3)
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Potentes, prepotentes e impotentes
Quino
Learning Probabilistic Graphical Models in R
David Bellot