The Cybersecurity Self-Help Guide
ARUN. SONI
Cloud Attack Vectors
Morey J. Haber & Brian Chappell & Christopher Hills
Ethical Hacker’s Penetration Testing Guide
Samir Kumar Rakshit
Операционная система UNIX, 2 изд.
Робачевский Андрей Михайлович
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary