Network Security Essentials: Applications and Standards
William Stallings
CEH Certified Ethical Hacker Study Guide
Kimberly Graves
Mastering Apache Spark
Mike Frampton
Tmux Taster
Mark McDonnell
Buffer Overflow Attacks: Detect, Exploit, Prevent
Vitaly Osipov
Building DMZs for Enterprise Networks
Robert J. Shimonski & Will Schmied & V Chang & Thomas W. Shinder
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero