The Small Gulf States: Foreign and security policies before and after the Arab Spring
Web Application Security Consortium (WASC) Threat Classification, v2.00
网络管理与安全 network management and security
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
Spring Security 3.1
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
Enterprise Level Security 1 & 2 Two Volume Set
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Introduction to Information Security. A Strategic-Based Approach
A SysAdmin’s Essential Guide to Linux Workstation Security
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Java on Smart Cards:Programming and Security
Core Security Patterns
Spring Security 3.x Cookbook
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
Climate Change as a Security Risk
CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam