Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
OpenStack Cloud Security
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Spring Security 3
Day One: Deploying BGP Routing Security
深入浅出Spring Security
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
Spring Security in Action
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Human Security, Transnational Crime and Human Trafficking: Asian and Western Perspectives
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Web Application Security Consortium (WASC) Threat Classification, v2.00
Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)