Privileged Attack Vectors
Morey J. Haber
Cloud Foundry: The Definitive Guide
Duncan C. E. Winn
Kali Linux Assuring Security by Penetration Testing, Fourth ...
Shiva V. N Parasram
Test Automation Engineering Handbook
Manikandan Sambamurthy
AWS System Administration
Mike Ryan & Federico Lucifredi
Cloud Native Infrastructure
Justin Garrison & Kris Nova
Deploying to OpenShift
Graham Dumpleton
Azure Integration Guide for Business
Joshua Garverick & Jack Lee & Mélony Qin & Trevoir Williams