Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Identity Attack Vectors
Morey J. Haber & Darran Rolls
The Art of Agile Development
James Shore
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
GIS Succinctly
Peter Shaw