IPTV Security: Protecting High-Value Digital Contents - David Ramirez
View more
IPTV Security: Protecting High-Value Digital Contents - David Ramirez
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
View more
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
Security Chaos Engineering - Kelly Shortridge
View more
Security Chaos Engineering - Kelly Shortridge
Web Application Security Consortium (WASC) Threat Classification, v2.00
View more
Web Application Security Consortium (WASC) Threat Classification, v2.00
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
View more
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
Implementing Email Security and Tokens: Current Standards, Tools, and Practices - Sean Turner and Russ Housley
View more
Implementing Email Security and Tokens: Current Standards, Tools, and Practices - Sean Turner and Russ Housley
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
View more
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
Security and Microservice Architecture on AWS - Gaurav Raje
View more
Security and Microservice Architecture on AWS - Gaurav Raje
Spring Security 3.x Cookbook
View more
Spring Security 3.x Cookbook
Security Analysis
View more
Security Analysis
Azure Security - Bojan Magušić
View more
Azure Security - Bojan Magušić
Network Security with OpenSSL
View more
Network Security with OpenSSL
BackTrack – Testing Wireless Network Security - Kevin Cardwell
View more
BackTrack – Testing Wireless Network Security - Kevin Cardwell
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century
View more
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
View more
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Foundations of Information Security - Jason Andress
View more
Foundations of Information Security - Jason Andress
Security for Service Oriented Architectures - Walter Williams
View more
Security for Service Oriented Architectures - Walter Williams
Web Security for Developers - Malcolm McDonald
View more
Web Security for Developers - Malcolm McDonald