Microservices: Quick Book: A practical guide with examples using Spring Boot, Cloud Config, Cloud Bus, Cloud Security, Eureka, Hystrix, Axon with CQRS and Event Sourcing
A SysAdmin’s Essential Guide to Linux Workstation Security
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
Human Security, Transnational Crime and Human Trafficking: Asian and Western Perspectives
网络管理与安全 network management and security
Spring Security 3.1
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
深入浅出Spring Security
Web Application Security Consortium (WASC) Threat Classification, v2.00
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Security Design Patterns
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Spring Security 3
Network Security with OpenSSL
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001