CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
网络管理与安全 network management and security
Spring Security 3.x Cookbook
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
Spring Security
Network Security with OpenSSL
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Risk management for computer security : Protecting your network and information assets
Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
Security Design Patterns
Day One: Deploying BGP Routing Security
Spring Security 3
Java on Smart Cards:Programming and Security
UTM Security with Fortinet
Spring Security in Action
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration