Identity Attack Vectors
Morey J. Haber & Darran Rolls
Mastering Linux Security and Hardening, Second Edition
Donald A. Tevault
Building Multi-Tenant SaaS Architectures
Tod Golding
Effective DevOps
Jennifer Davis & Ryn Daniels
Practical Mobile Forensics, Fourth Edition
Rohit Tamma & Oleg Skulkin & Heather Mahalik & Satish Bommisetty