| Kali Linux Revealed, première édition 2017 |
| L'imagerie militaire |
| The Debian Administrator's Handbook, édition 2015 | |
| Linux System Administrator's Guide, édition 2005 | |
| Securing & Optimizing Linux: The Ultimate Solution, édition 2002 | |
| Linux Security HOWTO v2.3 | |
| Manuel officiel de sécurisation de Debian, édition 2013 | |
| Red Hat Enterprise Linux 7 System Administrators Guide | |
| Improving the security of your unix system, édition 1990 | |
| An Approach to UNIX Security Logging édition 1998 | |
| The "Session Tty" Manager | |
| La documentation officielle Microsoft des commandes en ligne de Windows |
| Security Problems in the TCP/IP Protocol Suite | |
| Inferring Internet Denial-of-Service Activity | |
| Pseudo-Network Drivers and Virtual Networks | |
| PATHALIAS or The Care and Feeling of Relative Addresses | |
| Moat: a Virtual Private Network Appliance and Service Platform |
| Using PKI for PC Security | |
| AES Key Agility Issues in High-Speed IPsec Implementation | |
| A Better Key Schedule for DES-Like Ciphers | |
| Cryptographic Modes of Operation for the Internet | |
| Limitations of the Kerberos Authentication System | |
| Probable Plaintext Cryptanalysis of the IP Secyrity Protocols | |
| IPSec: Performance Analysis and Enhancements |
| Surmonting the Effects of Lossy Compression on Steganography |
| Java Security : From HotJava to Netscape and Beyond | |
| Ultimate Guide to Javascript Security from Feroot |
| Implementing a Distributed Firewall | |
| Improved Firewalling by Using IPV6 and Multiple Addresses per Host |
| Anomaly Detection in Cybersecurity For Dummies | |
| Quality of Security Service | |
| The Mobile Workforce - The Weakest Link | |
| From Desktop to Desert - Protect Your Devices, Protect Your Data | |
| Poinsec - Overview of PC Security | |
| An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied | |
| An introduction to Computer Security : The NIST Handbook | |
| Results of the Security in ActiveX Workshop | |
| Wiretapping the net | |
| Computer Security - An End State ? | |
| Critical Infrastructures You Can Trust : Where Telecommunications Fits | |
| The Evolution of Viruses and Worms |