Using system fingerprints to track attackers
Java EE Web Security By Example: Frank Kim
Ceh v5 module 22 penetration testing
Low Hanging Fruit from Penetration Testing
Web Vulnerability Assessments NEWDUG January, 2015.
Defending against Large-Scale Distributed Denial-of-Service Attacks
Security Best Practices : Applying Defense-in-depth Strategy to Protect the NGI_PL