Unauthorised Access
Wil Allsopp
grep Pocket Reference
John Bambenek
Hands-On AWS Penetration Testing with Kali Linux
Karl Gilbert & Benjamin Caudill
Network Analysis Using Wireshark 2 Cookbook
Nagendra Kumar Nainar & Yoram Orzach & Yogesh Ramdoss
Introduction to Sociology 2e
Heather Griffiths & Nathan Keirns & Gail Scaramuzzo & Susan Cody-Rydzewski & Eric Strayer & Sally Vyrain