SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux.
Linux Administration Cookbook : Insightful Recipes to Work with System Administration Tasks on Linux.
MASTERING LINUX ADMINISTRATION : a comprehensive guide to installing, configuring, and... maintaining linux systems in the modern data cente.
Linux for embedded and real-time applications /
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /
Linux Command Line and Shell Scripting Techniques : Master Practical Aspects of the Linux Command Line and Then Use It As a Part of the Shell Scripting Process.
Mastering Linux Device Driver Development Write Custom Device Drivers to Support Computer Peripherals in Linux Operating Systems.
Linux System Programming Techniques : Become a Proficient Linux System Programmer Using Expert Recipes and Techniques.
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Linux and the Unix philosophy /
Mastering Linux Shell Scripting : a practical guide to Linux command-line, Bash scripting, and Shell programming, 2nd Edition.
Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment /
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /
Practical Linux Security Cookbook : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition.
AWS Penetration Testing : Implement Various Security Strategies on AWS Using Tools Such As Kali Linux, Metasploit, and Nmap.
Linux for Networking Professionals : Securely Configure and Operate Linux Network Services for the Enterprise.
Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x /
Linux Mint essentials : a practical guide to Linux Mint for the novice to the professional /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Securing the cloud : cloud computer security techniques and tactics /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Managing Cisco network security /
Nokia network security : solutions handbook /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Who goes there? : authentication through the lens of privacy /
Designing and building enterprise DMZs /
Nessus network auditing /
SELinux Cookbook.