Building Secure and Reliable Systems
Heather Adkins & Betsy Beyer & Paul Blankinship & Piotr Lewandowski & Ana Oprea & Adam Stubblefield
The Complete Metasploit Guide
Sagar Rahalkar
Nmap Network Scanning
Gordon Lyon
Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary