1
Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation [E-Book] /
2
Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali linux for pentesting on the go [E-Book] /
3
Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit [E-Book] /
4
Attribute-based access control [E-Book] /
Subject (ZB): ...Computers -- Access control....

Full text 
5
Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, third edition [E-Book] /
6
Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Metasploit Penetration testing cookbook [E-Book] /
7
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack [E-Book] /
8
CMMI for Development : implementation guide [E-Book] /
Subject (ZB): ...Computers -- Access control....

Full text 
9
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments [E-Book] /
10
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it [E-Book] /
11
Samsung ARTIK reference : the definitive developers guide [E-Book] /
12
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available [E-Book] /
13
Identity management for internet of things [E-Book] /
Subject (ZB): ...Computers Access control....

Full text 
14
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux [E-Book] /
15
The rise of the computer state : the threat to our freedoms, our ethics and our democratic process [E-Book] /
16
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually [E-Book] /
17
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach [E-Book] /
18
Instant Java password and authentication security [E-Book] /
Subject (ZB): ...Computers Access control Passwords....

Full text 
19
A multidisciplinary introduction to information security [E-Book] /
20
Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics [E-Book] /