-
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications 电子书下载
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. T ...
06-27 [ None ]
-
Security Design Patterns 电子书下载
This Technical Guide provides a pattern-based security design methodology and a system of security design patterns. This methodol ...
04-10 [ None ]
-
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings 电子书下载
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for ...
09-06 [ None ]
-
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century 电子书下载
Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this ...
06-27 [ None ]
-
Introduction to Information Security. A Strategic-Based Approach 电子书下载
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear unders ...
06-27 [ None ]
-
Climate Change as a Security Risk 电子书下载
In this new flagship report, WBGU summarizes the state-of-the-art of science on the subject of Climate Change as a Security Risk. ...
06-07 [ None ]
-
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager 电子书下载
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data en ...
02-23 [ None ]
-
Human Security, Transnational Crime and Human Trafficking: Asian and Western Perspectives 电子书下载
In recent years, drug use, illegal migration and human trafficking have all become more common in Asia, North America and Asia: t ...
09-27 [ None ]