1
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux [E-Book] /
2
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually [E-Book] /
3
Network security [E-Book] /
4
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach [E-Book] /
5
Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework [E-Book] /
6
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 [E-Book] /
7
Role-based access control / [E-Book]
8
Integrated security systems design : concepts, specifications, and implementation [E-Book] /
9
Identity and access management solutions : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 [E-Book] /
10
Outsourcing information security [E-Book]/
11
Role-based access control / [E-Book]