Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Automation Through Chef Opscode: A Hands-On Approach to Chef
Navin Sabharwal & Manak Wadhwa
Comfortably Numb: The Inside Story of Pink Floyd
Mark Blake
Gchq
Richard Aldrich
Linux Administration: A Beginner's Guide, Fifth Edition
Wale Soyinka
Network Security: A Practical Approach
Jan L. Harrington
Software Defined Networking With OpenFlow
Siamak Azodolmolky
GNS3 Network Simulation Guide
Rednectar Chris Welsh
Network Security Through Data Analysis: Building Situational ...
Michael Collins
Linux Kernel Networking: Implementation and Theory
Rami Rosen
Ethernet: The Definitive Guide
Charles E. Spurgeon & Joann Zimmerman
Time Management for System Administrators
Thomas A. Limoncelli
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
The Illustrated Network: How TCP/IP Works in a Modern Network
Walter Goralski
Getting Started With Memcached
Ahmed Soliman
Linux Bible
Christopher Negus & Christine Bresnahan
Test-Driven Infrastructure With Chef
Stephen Nelson-Smith
Ipv6 Essentials
Silvia Hagen
Computer Networks
Andrew S. Tanenbaum & David Wetherall
Cisco CCIE Routing and Switching V5. 0
Narbik Kocharians & Peter Paluch & Wendell Odom
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Ec-Council
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile ...
Ethical Hacking and Countermeasures: Web Applications and Data ...
Gitolite Essentials
Sitaram Chamarty
Implementing Samba 4
Marcelo Leal
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi
Python for Unix and Linux System Administration
Noah Gift & Jeremy Jones
IPv6 Fundamentals: A Straightforward Approach to Understanding ...
Rick Graziani
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
TCP/IP Illustrated: Volume 1 The Protocols
Kevin R. Fall & W. Richard Stevens
TCP/IP Ilustrated (1)
TCP/IP Illustrated: Volume 2 The Implementation
Gary R. Wright & W. Richard Stevens
TCP/IP Ilustrated (2)
Apache Security
Ivan Ristic
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
4G: Deployment Strategies and Operational Implications
Trichy Venkataraman Krishnamurthy & Rajaneesh Shetty
MongoDB Basics
David Hows & Peter Membrey & Eelco Plugge
TCP/IP Illustrated: Volume 3 TCP for Transactions, HTTP, NNTP, ...
W. Richard Stevens & Gary R. Wright
TCP/IP Ilustrated (3)
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
Peter N. M. Hansteen
Practical Linux Infrastructure
Syed Ali
PMP® Exam Practice Test and Study Guide, Ninth Edition
J. Leroy Ward, Pmp, Pgmp & Ginger Levin
Cable Networks, Services, and Management
Mehmet Toy
Managing Windows Servers With Chef
John Ewart
Understanding Network Hacks: Attack and Defense With Python
Bastian Ballmann
Networking for VMware Administrators
Christopher Wahl & Steve Pantol
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
Networking the Complete Reference, Third Edition
Bobbi Sandberg
Learning OpenStack Networking
James Denton
Proxmox High Availability
Simon M. C. Cheng
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Random Wireless Networks
Rahul Vaze
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
NGINX High Performance
Rahul Sharma
Selinux Cookbook
Sven Vermeulen
Mastering Chef
Mayank Joshi
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Learning AWS
Aurobindo Sarkar & Amit Shah
WildFly Configuration, Deployment, and Administration - Second ...
Christopher Ritchie
IPv6 Essentials
Enterprise IPv6 for Enterprise Networks
Ghazi Mokammel Hossain
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
Moving to Office 365: Planning and Migration Guide
Matthew Katzer
Learning Vmware Nsx
Ranjit Singh Thakurratan
Network Security Assessment: Know Your Network
Chris McNab
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation ...
Luis Ayala
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston & Amanda Berlin