Securing VoIP Networks - Peter Thermos and Ari Takanen
View more
Securing VoIP Networks - Peter Thermos and Ari Takanen
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
View more
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Hacking and Securing iOS Applications - Jonathan Zdziarski
View more
Hacking and Securing iOS Applications - Jonathan Zdziarski
Testing and Securing Android Studio Applications
View more
Testing and Securing Android Studio Applications
Securing Hadoop - Sudheesh Narayanan
View more
Securing Hadoop - Sudheesh Narayanan
The Tangled Web: A Guide to Securing Modern Web Applications - Michal Zalewski
View more
The Tangled Web: A Guide to Securing Modern Web Applications - Michal Zalewski
Securing the Odds (Special Forces: Operation Alpha): A Gamblers Crossover Novella
View more
Securing the Odds (Special Forces: Operation Alpha): A Gamblers Crossover Novella
How to Cheat at Securing Windows 2000 TCP-IP
View more
How to Cheat at Securing Windows 2000 TCP-IP
Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition
View more
Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition
Securing Ajax Applications - Christopher Wells
View more
Securing Ajax Applications - Christopher Wells
Securing DevOps - Julien Vehent
View more
Securing DevOps - Julien Vehent
How to Cheat at: Securing SQL SERVER 2005 - Timothy Blum
View more
How to Cheat at: Securing SQL SERVER 2005 - Timothy Blum
Securing Windows Server 2008 - Dale Liu and Remco Wisselink
View more
Securing Windows Server 2008 - Dale Liu and Remco Wisselink
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
View more
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler