A SysAdmin’s Essential Guide to Linux Workstation Security
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
深入浅出Spring Security
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
OpenStack Cloud Security
Spring Security 3.1
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security
Java on Smart Cards:Programming and Security
Security Design Patterns
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
UTM Security with Fortinet
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Day One: Deploying BGP Routing Security
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)