Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
View more
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
Spring Security 3.1
View more
Spring Security 3.1
Sun Certified Security Administrator for Solaris 9 and 10 Study Guide - John Chirillo and Edgar Danielyan
View more
Sun Certified Security Administrator for Solaris 9 and 10 Study Guide - John Chirillo and Edgar Danielyan
UTM Security with Fortinet
View more
UTM Security with Fortinet
A SysAdmin’s Essential Guide to Linux Workstation Security
View more
A SysAdmin’s Essential Guide to Linux Workstation Security
Security for Service Oriented Architectures - Walter Williams
View more
Security for Service Oriented Architectures - Walter Williams
Essential PHP Security - Chris Shiflett
View more
Essential PHP Security - Chris Shiflett
The Web Application Hacker’s Handbook 2nd Edition: Finding and Exploiting Security Flaws - Dafydd Stuttard and Marcus Pinto
View more
The Web Application Hacker’s Handbook 2nd Edition: Finding and Exploiting Security Flaws - Dafydd Stuttard and Marcus Pinto
Security from Zero - Eric Higgins
View more
Security from Zero - Eric Higgins
Hacking Exposed Wireless Wireless Security Secrets and Solutions, 3rd Edition - Joshua Wright and Johnny Cache
View more
Hacking Exposed Wireless Wireless Security Secrets and Solutions, 3rd Edition - Joshua Wright and Johnny Cache
Web Application Security Consortium (WASC) Threat Classification, v2.00
View more
Web Application Security Consortium (WASC) Threat Classification, v2.00
Container Security - Liz Rice
View more
Container Security - Liz Rice
BackTrack – Testing Wireless Network Security - Kevin Cardwell
View more
BackTrack – Testing Wireless Network Security - Kevin Cardwell
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
View more
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
Kubernetes Security and Observability - Brendan Creane and Amit Gupta
View more
Kubernetes Security and Observability - Brendan Creane and Amit Gupta
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
View more
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
View more
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
Spring Security 3.x Cookbook
View more
Spring Security 3.x Cookbook