Linux Containers and Virtualization
Shashank Mohan Jain
Ethical Hacker’s Penetration Testing Guide
Samir Kumar Rakshit
Designing and Implementing Linux Firewalls with QoS Using Netfilter, ...
Lucian Gheorghe
Cloud Attack Vectors
Morey J. Haber & Brian Chappell & Christopher Hills
Nmap Network Scanning
Gordon Lyon