Linux iptables Pocket Reference
Gregor N. Purdy
Practical Linux Forensics
Bruce Nikkel
Cloud Attack Vectors
Morey J. Haber & Brian Chappell & Christopher Hills
Certified Ethical Hacker (CEH) Exam Cram
William Chuck Easttom
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary