Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Microservices: Quick Book: A practical guide with examples using Spring Boot, Cloud Config, Cloud Bus, Cloud Security, Eureka, Hystrix, Axon with CQRS and Event Sourcing
深入浅出Spring Security
Maximum Security
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
A SysAdmin’s Essential Guide to Linux Workstation Security
网络管理与安全 network management and security
Climate Change as a Security Risk
Mankale A Spring Security 3 X Cookbook Over 60 Recipes To Help You Successfully Safeguard Your Web Applications With Spring Security