Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Potentes, prepotentes e impotentes
Quino
GNS3 Network Simulation Guide
Rednectar Chris Welsh
Statistical Pattern Recognition
Andrew R. Webb & Keith D. Copsey
Network Security Through Data Analysis: Building Situational ...
Michael Collins