Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
Security Design Patterns
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)
UTM Security with Fortinet
深入浅出Spring Security
The Small Gulf States: Foreign and security policies before and after the Arab Spring
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
Spring Security
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
OpenStack Cloud Security
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
EISS Yearbook 1980–1981 Part I - Annuaire EISS 1980–1981 Partie I: Social security reforms in Europe II - La réforme de la sécurité sociale en Europe II
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers