Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
View more
Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
View more
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
View more
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
The Basics of Information Security - Jason Andress
View more
The Basics of Information Security - Jason Andress
Microservices Security in Action - Prabath Siriwardena and Nuwan Dias
View more
Microservices Security in Action - Prabath Siriwardena and Nuwan Dias
Mankale A Spring Security 3 X Cookbook Over 60 Recipes To Help You Successfully Safeguard Your Web Applications With Spring Security
View more
Mankale A Spring Security 3 X Cookbook Over 60 Recipes To Help You Successfully Safeguard Your Web Applications With Spring Security
Hacking Exposed Linux: Linux Security Secrets and Solutions 3rd Edition - Pete Herzog
View more
Hacking Exposed Linux: Linux Security Secrets and Solutions 3rd Edition - Pete Herzog
End-to-End Network Security Defense-in-Depth - Omar Santos
View more
End-to-End Network Security Defense-in-Depth - Omar Santos
Network Security Assessment 3rd Edition - Chris McNab
View more
Network Security Assessment 3rd Edition - Chris McNab
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
View more
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
IPTV Security: Protecting High-Value Digital Contents - David Ramirez
View more
IPTV Security: Protecting High-Value Digital Contents - David Ramirez
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
View more
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
97 Things Every Information Security Professional Should Know - Christina Morillo
View more
97 Things Every Information Security Professional Should Know - Christina Morillo
Azure Security - Bojan Magušić
View more
Azure Security - Bojan Magušić
Implementing Database Security and Auditing - Ron Ben Natan
View more
Implementing Database Security and Auditing - Ron Ben Natan
Security Design Patterns
View more
Security Design Patterns
Enterprise Level Security 1 & 2 Two Volume Set
View more
Enterprise Level Security 1 & 2 Two Volume Set