-
-
Web Security for Developers - Malcolm McDonald 电子书下载
Web Security for Developers - Malcolm McDonaldMalcolm McDonald ...
02-05 [ computer ]
-
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager 电子书下载
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data en ...
02-23 [ None ]
-
-
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler 电子书下载
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) WinklerVic (J.R.) Winkler ...
02-05 [ computer ]
-
LAN Switch Security: What Hackers Know About Your Switches - Eric Vyncke and Christopher Paggen 电子书下载
LAN Switch Security: What Hackers Know About Your Switches - Eric Vyncke and Christopher PaggenEric Vyncke and Christopher Paggen ...
02-05 [ computer ]
-
-
-
Android Application Security Essentials - Pragati Ogal Rai 电子书下载
Android Application Security Essentials - Pragati Ogal RaiPragati Ogal Rai ...
02-05 [ computer ]
-
Wireless Security Handbook - Aaron E. Earle 电子书下载
Wireless Security Handbook - Aaron E. EarleAaron E. Earle ...
02-05 [ computer ]
-
-
Cloud Native Security Cookbook - Josh Armitage 电子书下载
Cloud Native Security Cookbook - Josh ArmitageJosh Armitage ...
02-05 [ computer ]
-
Check Point NGX R65 Security Administration - Eli Faskha etc. 电子书下载
Check Point NGX R65 Security Administration - Eli Faskha etc.Eli Faskha etc. ...
02-05 [ computer ]
-
-
End-to-End Network Security Defense-in-Depth - Omar Santos 电子书下载
End-to-End Network Security Defense-in-Depth - Omar SantosOmar Santos ...
02-05 [ computer ]
-
Web Application Security - Andrew Hoffman 电子书下载
Web Application Security - Andrew HoffmanAndrew Hoffman ...
02-05 [ computer ]
-
Cybersecurity Ops with bash - Paul Troncone and Carl Albing 电子书下载
Cybersecurity Ops with bash - Paul Troncone and Carl AlbingPaul Troncone and Carl Albing ...
02-05 [ computer ]
-
Security Design Patterns 电子书下载
This Technical Guide provides a pattern-based security design methodology and a system of security design patterns. This methodol ...
04-10 [ None ]