UNIX network programming. Volume 2, Interprocess communicationsRichard W. StevensAgotado4,4Notifícame
The Web Application Hacker's Handbook Finding and Exploiting Security FlawsProQuestAgotado4,4Notifícame