Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
Guide to Wireless Network Security - John R. Vacca
Introduction to Information Security. A Strategic-Based Approach
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001