CISSP: 3 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Spring Security 3
UTM Security with Fortinet
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
OAuth 2.0 Cookbook: Protect Your Web Applications Using Spring Security
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
网络管理与安全 network management and security
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
Risk management for computer security : Protecting your network and information assets
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
Spring Security 3.1
Spring Security 3.x Cookbook
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration