Cryptography and Network Security: Principles and Practice 6th Edition.pdf
205.04MB
(IN)SECURE Magazine Issue 48.pdf
7.76MB
Learning Puppet Security: Secure your IT environments with the powerful security tools of Puppet.pdf
11.27MB
Securing the Internet of Things.pdf
7.04MB
The Home Security Handbook: Expert Advice for Keeping Safe at Home (and Away).epub
8.97MB
Linux User & Developer: Secure Your System Issue 167 2016.pdf
31.29MB
Security and the Networked Society.pdf
4.67MB
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security.pdf
7.44MB
CompTIA Security+ Get Certified Get Ahead SY0-301 Study Guide.pdf
4.09MB
Oracle Database Upgrade Migration, & Transformation Tips & Techniques: Best Practices for an Effective, Efficient, and Secure Transition.pdf
16.29MB
Next Generation SSH2: Implementation Securing Data in Motion.pdf
7.16MB
Efficient Secure Two-Party Protocols: Techniques and Constructions.pdf
2.56MB
Getting Started with Windows VDI: Create, maintain, and secure scalable and resilient virtual desktops with Windows 8.1 and Windows Server 2012 R2.azw3
5.58MB
Research Methods for Cyber Security.pdf
10.28MB
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management.chm
7.23MB
(IN)SECURE Magazine Issue 49 Privacy by Design: What is and Where to Build It.pdf
8.45MB
Securing the Cloud: Cloud Computer Security Techniques and Tactics.pdf
3.28MB
Security of Networks and Services in an All-Connected World.pdf
10.42MB
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures.pdf
5.55MB
Cloud Management and Security.pdf
6.15MB
(IN)SECURE Magazine Issue 43 What is the Value of Professional Certification.pdf
11.07MB
Artificial Immune System: Applications in Computer Security.pdf
11.29MB
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web.pdf
3.5MB
Cyber Security and IT Infrastructure Protection.pdf
9.6MB
SCION: A Secure Internet Architecture.pdf
8.5MB
Learning SaltStack: Build, manage, and secure your infrastructure by utilizing the power of SaltStack 2nd Edition.pdf
2.44MB
Foundations and Practice of Security.pdf
20.47MB
Fundamentals of Secure System Modelling.pdf
12.91MB
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP.epub
35.35MB
Cyberspace: Risks and Benefits for Society, Security and Development.pdf
3.62MB
Cyber Security: Everything an Executive Needs to Know.azw3
342.07KB
Network Security Assessment: Know Your Network 3rd edition.pdf
136.79MB
Learning Devise for Rails: Use Devise to make your Rails application accessible, user friendly, and secure.pdf
2.45MB
Data Security in Cloud Computing.pdf
14.77MB
Handbook of SCADA Control Systems Security.pdf
3.29MB
Cryptography and Secure Communication.pdf
4.11MB
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information.pdf
4.46MB
CompTIA CSA+ Cybersecurity Analyst Study Guide Exam CS0-001.azw3
10.31MB
Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide.pdf
4.78MB
Security Patterns in Practice: Designing Secure Architectures Using Software Patterns.epub
9.25MB
Building a Web Application with PHP and MariaDB: A Reference Guide - Build fast, secure, and interactive web applications using this comprehensive guide.pdf
3.6MB
(IN)SECURE Magazine RSA Conference 2015.pdf
7.19MB
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf
4.28MB
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters.pdf
5.12MB
Learning IOS Penetration Testing: Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests.pdf
12.14MB
Cyber Security Awareness for CEOs and Management.pdf
6.7MB
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services.pdf
7.56MB
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf
8.8MB
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools.pdf
62.89MB
Protocols for Secure Electronic Commerce 3rd Edition.pdf
20.14MB
GFI Network Security and PCI Compliance Power Tools.pdf
23.03MB
Mastering OpenVPN: Master building and integrating secure private networks using OpenVPN.pdf
23.08MB
Getting Started with OAuth 2.0: Programming clients for secure web API authorization and authentication.pdf
2.64MB
Exam Ref 70-744 Securing Windows Server 2016.pdf
28.02MB
Secure Data Provenance and Inference Control with Semantic Web.pdf
31.56MB
Handbook of Communications Security.pdf
57.6MB
Computer Communication, Networking and Internet Security.pdf
18.35MB
The Secure Online Business Handbook: E-Commerce, IT Functionality & Business Continuity.pdf
1.65MB
Linux User & Developer: Secure Your System Issue 181 2017.pdf
13.54MB
CompTIA Security SY0-301 Authorized Cert Guide 2nd Edition.pdf
10.88MB
Global Security: A Vision for the Future: Addressing the Challenges and Opportunities for Research in the Information Age.pdf
2.19MB
Cyber Warfare Its Implications on National Security.azw3
1.61MB
Information Security and Digital Forensics.pdf
2.83MB
GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client modules, and Web Services using Java EE and GlassFish security measures.pdf
5.06MB
Software Quality Assurance: Integrating Testing, Security, and Audit.pdf
6.78MB
Electronics for You: What's Being Done to Enhance Security in IoT November 2017.pdf
25.99MB
Patterns and Practices Web Service Security.pdf
4.8MB
Architectures and Protocols for Secure Inforamtion Technology Infrastructures.pdf
23.92MB
Microsoft Azure Security: Protect your solutions from malicious users using Microsoft Azure Services.pdf
11.12MB
Bosnian Security after Dayton: New perspectives.pdf
779.03KB
Microsoft Dynamics AX 2012 R3 Security: A quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations.pdf
4.4MB
(IN)SECURE Magazine RSA Conference 2017.pdf
12.89MB
Microsoft Dynamics AX 2012 Security How-To: Secure your Dynamics AX 2012 environment with simple and practical steps.pdf
3.01MB
Digital Privacy and Security Using Windows: A Practical Guide.pdf
9.84MB
The Complete Guide to Physical Security.pdf
17MB
Windows Server 2012 R2: Storage, Security, & Networking Pocket Consultant.pdf
6.88MB
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions.azw3
26.65MB
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis.pdf
7.39MB
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter: Learn how to secure your system and implement QoS using real-world scenarios for entworks of al sizes.pdf
13.43MB
Mobile Payment Systems: Secure Network Architectures and Protocols.pdf
3.74MB
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers.pdf
15.32MB
Analyzing and Securing Social Networks.pdf
20.67MB
Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud.pdf
8.77MB
Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems 2nd Edition 2nd Edition.pdf
11.88MB
What Every Engineer Should Know About Cyber Security and Digital Forensics.pdf
5.46MB
Aspect-Oriented Security Hardening of UML Design Models.pdf
8.95MB
Metrics and Methods for Security Risk Management.pdf
6.16MB
Toward a Safer and More Secure Cyberspace.pdf
1.56MB
iOS Application Security: The Definitive Guide for Hackers and Developers.pdf
16.31MB
Securely Implementing Network Protocols: Detecting and Preventing Logical Flaws.pdf
1.1MB
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.pdf
3.84MB
Mobile, Secure, and Programmable Networking.pdf
20.5MB
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems.pdf
6.54MB
(IN)SECURE Magazine RSA Conference 2014.pdf
5.61MB
Vulnerability, Exploitation and Migrants Insecure Work in a Globalised Economy.pdf
1.43MB
What Is Computer Science: An Information Security Perspective.pdf
6.17MB
(IN)SECURE Magazine Issue 54.pdf
10.98MB
Securing Cloud and Mobility: A Practitioner's Guide.pdf
4.33MB
Prinxiples of Security and Trust 2016.pdf
10.99MB
Mobile Cloud Computing: Models, Implementation, and Security.pdf
26.99MB
Counterterrorism and Cybersecurity: Total Information Awareness 2nd Edition.pdf
26.22MB
Networks and Network Analysis for Defence and Security.pdf
5.7MB
Data Mining and Machine Learning in Cybersecurity.pdf
3.16MB
(IN)SECURE Magazine Issue 45 Tackling Today's Authentication Complexities.pdf
5.88MB
Case Studies in Secure Computing: Achievements and Trends.pdf
5.6MB
Hardware IP Security and Trust.pdf
9.73MB
Security and Loss Prevention: An Introduction 6th Edition.pdf
9.23MB
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies.pdf
8.1MB
Complexity, Security and Civil Society in East Asia: Foreign Policies and the Korean Peninsula.pdf
6.72MB
(IN)SECURE Magazine Issue 41 Privacy in the Cloud: The Power of Encryption.pdf
7.86MB
Developing and Securing the Cloud.pdf
62.33MB
Protecting Privacy in Data Release: Advances in Information Security.pdf
7.73MB
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance 3rd Edition.pdf
51.72MB
Oracle SOA Suite 11g Administrator's Handbook: Create a reliable, secure, and flexible environment for your Oracle SOA Suite 11g Service Infrastructure and SOA composite applications.pdf
9.39MB
(IN)SECURE Magazine Issue 50.pdf
6.85MB