Security Design Patterns
View more
Security Design Patterns
The Small Gulf States: Foreign and security policies before and after the Arab Spring
View more
The Small Gulf States: Foreign and security policies before and after the Arab Spring
Container Security - Liz Rice
View more
Container Security - Liz Rice
Security Chaos Engineering - Kelly Shortridge
View more
Security Chaos Engineering - Kelly Shortridge
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
View more
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
Climate Change as a Security Risk
View more
Climate Change as a Security Risk
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
View more
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
Cloud Native Security Cookbook - Josh Armitage
View more
Cloud Native Security Cookbook - Josh Armitage
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
View more
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
View more
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Network Security Hacks 2nd Edition - Andrew Lockhart
View more
Network Security Hacks 2nd Edition - Andrew Lockhart
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
View more
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam
View more
CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
View more
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century
View more
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century
Microservices Security in Action - Prabath Siriwardena and Nuwan Dias
View more
Microservices Security in Action - Prabath Siriwardena and Nuwan Dias
Synchronizing Internet Protocol Security (SIPSec) - Charles A. Shoniregun
View more
Synchronizing Internet Protocol Security (SIPSec) - Charles A. Shoniregun