Defensive Security Handbook - Lee Brotherston and Amanda Berlin
View more
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
API Security in Action - Neil Madden
View more
API Security in Action - Neil Madden
Security as Code - BK Sarthak Das and Virginia Chu
View more
Security as Code - BK Sarthak Das and Virginia Chu
UTM Security with Fortinet
View more
UTM Security with Fortinet
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
View more
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
View more
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
View more
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
97 Things Every Information Security Professional Should Know - Christina Morillo
View more
97 Things Every Information Security Professional Should Know - Christina Morillo
Introduction to Information Security. A Strategic-Based Approach
View more
Introduction to Information Security. A Strategic-Based Approach
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
View more
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
Wireless Network Security - Yang Xiao, Xuemin Shen, and Ding-Zhu Du
View more
Wireless Network Security - Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
View more
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Hacking Exposed Linux: Linux Security Secrets and Solutions 3rd Edition - Pete Herzog
View more
Hacking Exposed Linux: Linux Security Secrets and Solutions 3rd Edition - Pete Herzog
CISSP: Certified Information Systems Security Professional 2nd Edition - Ed Tittel, James Michael Stewart and Mike Chapple
View more
CISSP: Certified Information Systems Security Professional 2nd Edition - Ed Tittel, James Michael Stewart and Mike Chapple
Implementing Email Security and Tokens: Current Standards, Tools, and Practices - Sean Turner and Russ Housley
View more
Implementing Email Security and Tokens: Current Standards, Tools, and Practices - Sean Turner and Russ Housley
深入浅出Spring Security
View more
深入浅出Spring Security
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
View more
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.