Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Identity-Native Infrastructure Access Management
Ev Kontsevoy & Sakshyam Shah & and Peter Conrad
Nmap: Network Exploration and Security Auditing Cookbook - Second ...
Paulino Calderon
Becoming the Hacker
Adrian Pruteanu
Learn You a Haskell for Great Good!
Miran Lipovaca