Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Arduino для секретных агентов
Марко Шварц
Asterisk: The Definitive Guide
Jim Van Meggelen & Russell Bryant & Leif Madsen
Ethical Hacker’s Penetration Testing Guide
Samir Kumar Rakshit
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary