Introduction to Information Security. A Strategic-Based Approach
Climate Change as a Security Risk
CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam
Web Application Security Consortium (WASC) Threat Classification, v2.00
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
A SysAdmin’s Essential Guide to Linux Workstation Security
Network Security with OpenSSL
Security Design Patterns
Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)
Microservices: Quick Book: A practical guide with examples using Spring Boot, Cloud Config, Cloud Bus, Cloud Security, Eureka, Hystrix, Axon with CQRS and Event Sourcing
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
Day One: Deploying BGP Routing Security
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Java on Smart Cards:Programming and Security
网络管理与安全 network management and security
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers