Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Climate Change as a Security Risk
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists Use of the World Wide Web ... (Nato Science for Peace and Security)
Human Security, Transnational Crime and Human Trafficking: Asian and Western Perspectives
Introduction to Information Security. A Strategic-Based Approach
Core Security Patterns
Spring Security in Action
Spring Security
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods
Tor Browser: Secrets of the Deep Web, How to Stay Anonymous Online, and Surf the Web Like a Hacker (Hacking, Cyber Security, Tor Browser, Anonymous, Deep Web, Dark Web)
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Security Design Patterns
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century
Deployment and use of security technology : hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Seventh Congress, first session, October 11, 2001