Identity Attack Vectors
Morey J. Haber & Darran Rolls
Privileged Attack Vectors
Morey J. Haber
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Writing API Tests with Karate
Benjamin Bischoff
GIS Succinctly
Peter Shaw