网络管理与安全 network management and security
View more
网络管理与安全 network management and security
CISCO Official Cert Guide CCNA Security 640-554 - Keith Barker and Scott Morris
View more
CISCO Official Cert Guide CCNA Security 640-554 - Keith Barker and Scott Morris
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
View more
Defensive Security Handbook - Lee Brotherston and Amanda Berlin
Practical Cloud Security - Chris Dotson
View more
Practical Cloud Security - Chris Dotson
Azure Security - Bojan Magušić
View more
Azure Security - Bojan Magušić
Security as Code - BK Sarthak Das and Virginia Chu
View more
Security as Code - BK Sarthak Das and Virginia Chu
Full Stack Python Security - Dennis Byrne
View more
Full Stack Python Security - Dennis Byrne
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
View more
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Security Chaos Engineering - Kelly Shortridge
View more
Security Chaos Engineering - Kelly Shortridge
The Cybersecurity Manager’s Guide - Todd Barnum
View more
The Cybersecurity Manager’s Guide - Todd Barnum
Essential PHP Security - Chris Shiflett
View more
Essential PHP Security - Chris Shiflett
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
View more
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
View more
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
Security and Microservice Architecture on AWS - Gaurav Raje
View more
Security and Microservice Architecture on AWS - Gaurav Raje
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
View more
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition - Chris Anley, John Heasman, Felix “FX” Linder and Gerardo Richarte
Threat Modeling: Designing for Security - Adam Shostack
View more
Threat Modeling: Designing for Security - Adam Shostack
Climate Change as a Security Risk
View more
Climate Change as a Security Risk
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security
View more
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security