Testing and Securing Android Studio Applications
How to Cheat at Securing Windows 2000 TCP-IP
Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition
Securing the Odds (Special Forces: Operation Alpha): A Gamblers Crossover Novella
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications