Spring Security 3.1
View more
Spring Security 3.1
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
View more
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Spring Security in Action
View more
Spring Security in Action
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
View more
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
Cybersecurity Ops with bash - Paul Troncone and Carl Albing
View more
Cybersecurity Ops with bash - Paul Troncone and Carl Albing
Java on Smart Cards:Programming and Security
View more
Java on Smart Cards:Programming and Security
Embedded Java Security: Security for Mobile Devices - Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua
View more
Embedded Java Security: Security for Mobile Devices - Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua
AWS Security - Dylan Shields
View more
AWS Security - Dylan Shields
OpenStack Cloud Security
View more
OpenStack Cloud Security
Instant Messaging Security - John W. Rittinghouse and James F. Ransome
View more
Instant Messaging Security - John W. Rittinghouse and James F. Ransome
Foundations of Information Security - Jason Andress
View more
Foundations of Information Security - Jason Andress
The Small Gulf States: Foreign and security policies before and after the Arab Spring
View more
The Small Gulf States: Foreign and security policies before and after the Arab Spring
Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
View more
Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
Full Stack Python Security - Dennis Byrne
View more
Full Stack Python Security - Dennis Byrne
Thinking Security - Steven M. Bellovin
View more
Thinking Security - Steven M. Bellovin
A SysAdmin’s Essential Guide to Linux Workstation Security
View more
A SysAdmin’s Essential Guide to Linux Workstation Security
Certified Kubernetes Security Specialist (CKS) Study Guide - Benjamin Muschko
View more
Certified Kubernetes Security Specialist (CKS) Study Guide - Benjamin Muschko
Azure Security - Bojan Magušić
View more
Azure Security - Bojan Magušić