DevOps on the Microsoft Stack
Unknown
SQL Injection Attacks and Defense
Yuvi
Design Patterns in Java
Beginning Linux Programming 4e (Wrox, 2007)
Linux Essentials
Christine Bresnahan & Richard Blum
Advanced Penetration Testing: Hacking the World's Most Secure ...
Wil Allsopp
Wireshark for Security Professionals: Using Wireshark and the ...
Jeff T. Parker
Managing and Using Information Systems: A Strategic Approach, ...
Keri E. Pearlson & Carol S. Saunders & Dennis F. Galletta