OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
View more
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
The Web Application Hacker’s Handbook 2nd Edition: Finding and Exploiting Security Flaws - Dafydd Stuttard and Marcus Pinto
View more
The Web Application Hacker’s Handbook 2nd Edition: Finding and Exploiting Security Flaws - Dafydd Stuttard and Marcus Pinto
Container Security - Liz Rice
View more
Container Security - Liz Rice
Check Point NGX R65 Security Administration - Eli Faskha etc.
View more
Check Point NGX R65 Security Administration - Eli Faskha etc.
深入浅出Spring Security
View more
深入浅出Spring Security
Core Security Patterns
View more
Core Security Patterns
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
View more
Data Science and Security: Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems, 462)
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
View more
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
Wireless Network Security - Yang Xiao, Xuemin Shen, and Ding-Zhu Du
View more
Wireless Network Security - Yang Xiao, Xuemin Shen, and Ding-Zhu Du
A SysAdmin’s Essential Guide to Linux Workstation Security
View more
A SysAdmin’s Essential Guide to Linux Workstation Security
Security for Service Oriented Architectures - Walter Williams
View more
Security for Service Oriented Architectures - Walter Williams
Spring Security 3
View more
Spring Security 3
Essential PHP Security - Chris Shiflett
View more
Essential PHP Security - Chris Shiflett
Microservices Security in Action - Prabath Siriwardena and Nuwan Dias
View more
Microservices Security in Action - Prabath Siriwardena and Nuwan Dias
Windows Server 2008 Security: Resource Kit - Jesper M. Johansson
View more
Windows Server 2008 Security: Resource Kit - Jesper M. Johansson
Java on Smart Cards:Programming and Security
View more
Java on Smart Cards:Programming and Security
CISSP: Certified Information Systems Security Professional 2nd Edition - Ed Tittel, James Michael Stewart and Mike Chapple
View more
CISSP: Certified Information Systems Security Professional 2nd Edition - Ed Tittel, James Michael Stewart and Mike Chapple
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
View more
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)