CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
Enterprise Level Security 1 & 2 Two Volume Set
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century
The Small Gulf States: Foreign and security policies before and after the Arab Spring
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
Network Security with OpenSSL
Climate Change as a Security Risk
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001
Security Analysis
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Risk management for computer security : Protecting your network and information assets
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
Day One: Deploying BGP Routing Security
Mankale A Spring Security 3 X Cookbook Over 60 Recipes To Help You Successfully Safeguard Your Web Applications With Spring Security
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security