Advanced Penetration Testing for Highly-Secured Environments 2nd Edition - Lee Allen and Kevin Cardwell
View more
Advanced Penetration Testing for Highly-Secured Environments 2nd Edition - Lee Allen and Kevin Cardwell
Cisco Secure Firewall Services Module - Ray Blair and Arvind Durai
View more
Cisco Secure Firewall Services Module - Ray Blair and Arvind Durai
Designing Secure Software - Loren Kohnfelder
View more
Designing Secure Software - Loren Kohnfelder
TypeScript Microservices: Build, deploy, and secure Microservices using TypeScript combined with Node.js
View more
TypeScript Microservices: Build, deploy, and secure Microservices using TypeScript combined with Node.js
The Corruption Cure: How Citizens and Leaders Can Combat Graft
View more
The Corruption Cure: How Citizens and Leaders Can Combat Graft
Secure PHP Development: Building 50 Practical Applications - Mohammed J. Kabir
View more
Secure PHP Development: Building 50 Practical Applications - Mohammed J. Kabir
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
View more
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Secure Programming Cookbook for C and C++ - John Viega and Matt Messier
View more
Secure Programming Cookbook for C and C++ - John Viega and Matt Messier
Secure by Design - Dan Bergh Johnsson
View more
Secure by Design - Dan Bergh Johnsson
Secure Coding in C and C++ 2nd Edition - Robert C. Seacord
View more
Secure Coding in C and C++ 2nd Edition - Robert C. Seacord
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
View more
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
Causal Inference in Python - Matheus Facure
View more
Causal Inference in Python - Matheus Facure
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
View more
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
Permanent cure for premature ejaculation: The Penis anatomy
View more
Permanent cure for premature ejaculation: The Penis anatomy
The Hidden Power of a Master Pick-up Artist: How to Cure Approach Anxiety and Achieve your Goals as a Pick-up Artist and More
View more
The Hidden Power of a Master Pick-up Artist: How to Cure Approach Anxiety and Achieve your Goals as a Pick-up Artist and More
Administering ArcGIS for Server: Installing and configuring ArcGIS for Server to publish, optimize, and secure GIS services
View more
Administering ArcGIS for Server: Installing and configuring ArcGIS for Server to publish, optimize, and secure GIS services
Recovered, Not Cured: A Journey Through Schizophrenia
View more
Recovered, Not Cured: A Journey Through Schizophrenia
Citrix Access Gateway VPX 5.04 Essentials: A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
View more
Citrix Access Gateway VPX 5.04 Essentials: A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX