-
Spring Security in Action 电子书下载
Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll ...
06-27 [ None ]
-
IPTV Security: Protecting High-Value Digital Contents - David Ramirez 电子书下载
IPTV Security: Protecting High-Value Digital Contents - David RamirezDavid Ramirez ...
02-05 [ computer ]
-
Certified Kubernetes Security Specialist (CKS) Study Guide - Benjamin Muschko 电子书下载
Certified Kubernetes Security Specialist (CKS) Study Guide - Benjamin MuschkoBenjamin Muschko ...
02-05 [ computer ]
-
The Web Application Hacker’s Handbook 2nd Edition: Finding and Exploiting Security Flaws - Dafydd Stuttard and Marcus Pinto 电子书下载
The Web Application Hacker’s Handbook 2nd Edition: Finding and Exploiting Security Flaws - Dafydd Stuttard and Marcus PintoDafydd Stuttard and Marcus ...
02-05 [ computer ]
-
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings 电子书下载
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for ...
09-06 [ None ]
-
-
-
Android Application Security Essentials - Pragati Ogal Rai 电子书下载
Android Application Security Essentials - Pragati Ogal RaiPragati Ogal Rai ...
02-05 [ computer ]
-
Cybersecurity for Small Networks - Seth Enoka 电子书下载
Cybersecurity for Small Networks - Seth EnokaSeth Enoka ...
02-05 [ computer ]
-
Synchronizing Internet Protocol Security (SIPSec) - Charles A. Shoniregun 电子书下载
Synchronizing Internet Protocol Security (SIPSec) - Charles A. ShoniregunCharles A. Shoniregun ...
02-05 [ computer ]
-
Network Security Hacks 2nd Edition - Andrew Lockhart 电子书下载
Network Security Hacks 2nd Edition - Andrew LockhartAndrew Lockhart ...
02-05 [ computer ]
-
-
The Small Gulf States: Foreign and security policies before and after the Arab Spring 电子书下载
Small states are often believed to have been resigned to the margins of international politics. However, the recent increase in t ...
06-27 [ None ]
-
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications) 电子书下载
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architec ...
09-06 [ None ]
-
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues) 电子书下载
The impact of energy on global security and economy is clear and profound, and this is why in recent years energy security has be ...
10-08 [ None ]
-
Foundations of Information Security - Jason Andress 电子书下载
Foundations of Information Security - Jason AndressJason Andress ...
02-05 [ computer ]
-
Azure Security - Bojan Magušić 电子书下载
Azure Security - Bojan MagušićBojan Magušić ...
02-05 [ computer ]
-
Cybersecurity Ops with bash - Paul Troncone and Carl Albing 电子书下载
Cybersecurity Ops with bash - Paul Troncone and Carl AlbingPaul Troncone and Carl Albing ...
02-05 [ computer ]