Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Hacking - The art of exploitation
Jon Erickson
Linux на примерах. Практика, практика и только практика
Колисниченко Д.Н.
Wireshark Fundamentals
Vinit Jain
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary