Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions - Rich Cannings, Himanshu Dwivedi and Zane Lackey
View more
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions - Rich Cannings, Himanshu Dwivedi and Zane Lackey
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
View more
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
The Cybersecurity Manager’s Guide - Todd Barnum
View more
The Cybersecurity Manager’s Guide - Todd Barnum
Advanced API Security - Prabath Siriwardena
View more
Advanced API Security - Prabath Siriwardena
Web Application Security Consortium (WASC) Threat Classification, v2.00
View more
Web Application Security Consortium (WASC) Threat Classification, v2.00
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
View more
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
Risk management for computer security : Protecting your network and information assets
View more
Risk management for computer security : Protecting your network and information assets
Foundations of Information Security - Jason Andress
View more
Foundations of Information Security - Jason Andress
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
View more
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
View more
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Wireless and Mobile Network Security - Hakima Chaouchi and Maryline Laurent-Maknavicius
View more
Wireless and Mobile Network Security - Hakima Chaouchi and Maryline Laurent-Maknavicius
Instant Messaging Security - John W. Rittinghouse and James F. Ransome
View more
Instant Messaging Security - John W. Rittinghouse and James F. Ransome
Agile Application Security - Laura Bell, Michael Brunton-Spall, Rich Smith, and Jim Bird
View more
Agile Application Security - Laura Bell, Michael Brunton-Spall, Rich Smith, and Jim Bird
Application Security Program Handbook - Derek Fisher
View more
Application Security Program Handbook - Derek Fisher
The Basics of Information Security - Jason Andress
View more
The Basics of Information Security - Jason Andress
Practical Cloud Security - Chris Dotson
View more
Practical Cloud Security - Chris Dotson
Security from Zero - Eric Higgins
View more
Security from Zero - Eric Higgins
Cybersecurity Ops with bash - Paul Troncone and Carl Albing
View more
Cybersecurity Ops with bash - Paul Troncone and Carl Albing