Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
深入浅出Spring Security
Human Security, Transnational Crime and Human Trafficking: Asian and Western Perspectives
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security
The Small Gulf States: Foreign and security policies before and after the Arab Spring
CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
EISS Yearbook 1980–1981 Part I - Annuaire EISS 1980–1981 Partie I: Social security reforms in Europe II - La réforme de la sécurité sociale en Europe II
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
Enterprise Level Security 1 & 2 Two Volume Set
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
Microservices: Quick Book: A practical guide with examples using Spring Boot, Cloud Config, Cloud Bus, Cloud Security, Eureka, Hystrix, Axon with CQRS and Event Sourcing
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security