Wireless Hacking with Kali Linux
Hugo Hoffman
Linux Command Line and Shell Scripting Techniques
Vedran Dakic & Jasmin Redzepagic
Kubernetes Patterns
Bilgin Ibryam & Roland Huß
The Cybersecurity Self-Help Guide
ARUN. SONI
Pluggable Authentication Modules
Kenneth Geisshirt