Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Introduction to Information Security. A Strategic-Based Approach
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
Mankale A Spring Security 3 X Cookbook Over 60 Recipes To Help You Successfully Safeguard Your Web Applications With Spring Security
The Small Gulf States: Foreign and security policies before and after the Arab Spring
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security
CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam
Enterprise Level Security 1 & 2 Two Volume Set
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Spring Security 3
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Day One: Deploying BGP Routing Security
Web Application Security Consortium (WASC) Threat Classification, v2.00
A SysAdmin’s Essential Guide to Linux Workstation Security