Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Practical Digital Forensics
Richard Boddington
SQL Injection Strategies: Practical techniques to secure old ...
Ettore Galluccio & Edoardo Caselli & Gabriele Lombari
Linux Firewalls
Michael Rash
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary