The Complete Metasploit Guide
Sagar Rahalkar
Подпольный интернет. Темная сторона мировой паутины
Джейми Бартлетт
Zabbix 5 IT Infrastructure Monitoring Cookbook
Nathan Liefting & Brian van Baekel
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
B. B. Gupta and Pooja Chaudhary
Certified Ethical Hacker (CEH) Exam Cram
William Chuck Easttom