Advanced Penetration Testing for Highly-Secured Environments 2nd Edition - Lee Allen and Kevin Cardwell
View more
Advanced Penetration Testing for Highly-Secured Environments 2nd Edition - Lee Allen and Kevin Cardwell
Secure Java: For Web Application Development - Abhay Bhargav and B.V. Kumar
View more
Secure Java: For Web Application Development - Abhay Bhargav and B.V. Kumar
Cisco Secure Firewall Services Module - Ray Blair and Arvind Durai
View more
Cisco Secure Firewall Services Module - Ray Blair and Arvind Durai
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
View more
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
Secure Coding in C and C++ 2nd Edition - Robert C. Seacord
View more
Secure Coding in C and C++ 2nd Edition - Robert C. Seacord
The Art of WebAssembly: Build Secure, Portable, High-Performance Applications
View more
The Art of WebAssembly: Build Secure, Portable, High-Performance Applications
Secure Programming Cookbook for C and C++ - John Viega and Matt Messier
View more
Secure Programming Cookbook for C and C++ - John Viega and Matt Messier
Designing Secure Software - Loren Kohnfelder
View more
Designing Secure Software - Loren Kohnfelder
Citrix Access Gateway VPX 5.04 Essentials: A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
View more
Citrix Access Gateway VPX 5.04 Essentials: A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
View more
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
TypeScript Microservices: Build, deploy, and secure Microservices using TypeScript combined with Node.js
View more
TypeScript Microservices: Build, deploy, and secure Microservices using TypeScript combined with Node.js
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
View more
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Secure PHP Development: Building 50 Practical Applications - Mohammed J. Kabir
View more
Secure PHP Development: Building 50 Practical Applications - Mohammed J. Kabir
Building Secure and Reliable Systems - Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, and Adam Stubblefield
View more
Building Secure and Reliable Systems - Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, and Adam Stubblefield
Administering ArcGIS for Server: Installing and configuring ArcGIS for Server to publish, optimize, and secure GIS services
View more
Administering ArcGIS for Server: Installing and configuring ArcGIS for Server to publish, optimize, and secure GIS services
Secure by Design - Dan Bergh Johnsson
View more
Secure by Design - Dan Bergh Johnsson