Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Ethical Hacker’s Penetration Testing Guide
Samir Kumar Rakshit
Practical System Programming with C: Pragmatic Example Applications ...
Sri Manikanta Palakollu
Certified Ethical Hacker (CEH) Exam Cram
William Chuck Easttom
Hacking - The art of exploitation
Jon Erickson
Операционная система UNIX, 2 изд.
Робачевский Андрей Михайлович
Nmap Network Scanning
Gordon Lyon