AntiPatterns : Identification, Refactoring, and Management
Phillip A. Laplante & Colin J. Neill
Unauthorised Access: Physical Penetration Testing For IT Security ...
Wil Allsopp
Red Hat® Linux® Security and Optimization
Unknown
Java EE 8 Recipes, 2nd Edition
Josh Juneau
Implementing DevOps with Ansible 2
Jonathan McAllister