Secure Data Provenance and Inference Control with Semantic Web.pdf 33.1 MB
Linux User & Developer: Secure Your System Issue 167 2016.pdf 32.8 MB
Exam Ref 70-744 Securing Windows Server 2016.pdf 29.4 MB
Mobile Cloud Computing: Models, Implementation, and Security.pdf 28.3 MB
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions.azw3 27.9 MB
Counterterrorism and Cybersecurity: Total Information Awareness 2nd Edition.pdf 27.5 MB
Electronics for You: What's Being Done to Enhance Security in IoT November 2017.pdf 27.2 MB
Architectures and Protocols for Secure Inforamtion Technology Infrastructures.pdf 25.1 MB
Mastering OpenVPN: Master building and integrating secure private networks using OpenVPN.pdf 24.2 MB
GFI Network Security and PCI Compliance Power Tools.pdf 24.2 MB
Analyzing and Securing Social Networks.pdf 21.7 MB
Mobile, Secure, and Programmable Networking.pdf 21.5 MB
Foundations and Practice of Security.pdf 21.5 MB
Protocols for Secure Electronic Commerce 3rd Edition.pdf 21.1 MB
Computer Communication, Networking and Internet Security.pdf 19.2 MB
The Complete Guide to Physical Security.pdf 17.8 MB
iOS Application Security: The Definitive Guide for Hackers and Developers.pdf 17.1 MB
Oracle Database Upgrade Migration, & Transformation Tips & Techniques: Best Practices for an Effective, Efficient, and Secure Transition.pdf 17.1 MB
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers.pdf 16.1 MB
Data Security in Cloud Computing.pdf 15.5 MB
Linux User & Developer: Secure Your System Issue 181 2017.pdf 14.2 MB
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter: Learn how to secure your system and implement QoS using real-world scenarios for entworks of al sizes.pdf 14.1 MB
Fundamentals of Secure System Modelling.pdf 13.5 MB
Security of Networks and Services in an All-Connected World.pdf 10.9 MB
CompTIA CSA+ Cybersecurity Analyst Study Guide Exam CS0-001.azw3 10.8 MB
Research Methods for Cyber Security.pdf 10.8 MB
Digital Privacy and Security Using Windows: A Practical Guide.pdf 10.3 MB
Hardware IP Security and Trust.pdf 10.2 MB
Cyber Security and IT Infrastructure Protection.pdf 10.1 MB
Oracle SOA Suite 11g Administrator's Handbook: Create a reliable, secure, and flexible environment for your Oracle SOA Suite 11g Service Infrastructure and SOA composite applications.pdf 9.8 MB
Security Patterns in Practice: Designing Secure Architectures Using Software Patterns.epub 9.7 MB
Security and Loss Prevention: An Introduction 6th Edition.pdf 9.7 MB
The Home Security Handbook: Expert Advice for Keeping Safe at Home (and Away).epub 9.4 MB
Aspect-Oriented Security Hardening of UML Design Models.pdf 9.4 MB
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf 9.2 MB
Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud.pdf 9.2 MB
SCION: A Secure Internet Architecture.pdf 8.9 MB
(IN)SECURE Magazine Issue 49 Privacy by Design: What is and Where to Build It.pdf 8.9 MB
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies.pdf 8.5 MB
(IN)SECURE Magazine Issue 41 Privacy in the Cloud: The Power of Encryption.pdf 8.2 MB
(IN)SECURE Magazine Issue 48.pdf 8.1 MB
Protecting Privacy in Data Release: Advances in Information Security.pdf 8.1 MB
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services.pdf 7.9 MB
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security.pdf 7.8 MB
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis.pdf 7.7 MB
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management.chm 7.6 MB
Case Studies in Secure Computing: Achievements and Trends.pdf 5.9 MB
Getting Started with Windows VDI: Create, maintain, and secure scalable and resilient virtual desktops with Windows 8.1 and Windows Server 2012 R2.azw3 5.8 MB
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures.pdf 5.8 MB
What Every Engineer Should Know About Cyber Security and Digital Forensics.pdf 5.7 MB
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters.pdf 5.4 MB
GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client modules, and Web Services using Java EE and GlassFish security measures.pdf 5.3 MB
Patterns and Practices Web Service Security.pdf 5.0 MB
Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide.pdf 5.0 MB
Security and the Networked Society.pdf 4.9 MB
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information.pdf 4.7 MB
Microsoft Dynamics AX 2012 R3 Security: A quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations.pdf 4.6 MB
Securing Cloud and Mobility: A Practitioner's Guide.pdf 4.5 MB
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf 4.5 MB
Cryptography and Secure Communication.pdf 4.3 MB
CompTIA Security+ Get Certified Get Ahead SY0-301 Study Guide.pdf 4.3 MB
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.pdf 4.0 MB
Mobile Payment Systems: Secure Network Architectures and Protocols.pdf 3.9 MB
Cyberspace: Risks and Benefits for Society, Security and Development.pdf 3.8 MB
Building a Web Application with PHP and MariaDB: A Reference Guide - Build fast, secure, and interactive web applications using this comprehensive guide.pdf 3.8 MB
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web.pdf 3.7 MB
Handbook of SCADA Control Systems Security.pdf 3.4 MB
Securing the Cloud: Cloud Computer Security Techniques and Tactics.pdf 3.4 MB
Data Mining and Machine Learning in Cybersecurity.pdf 3.3 MB
Microsoft Dynamics AX 2012 Security How-To: Secure your Dynamics AX 2012 environment with simple and practical steps.pdf 3.2 MB
Information Security and Digital Forensics.pdf 3.0 MB
Getting Started with OAuth 2.0: Programming clients for secure web API authorization and authentication.pdf 2.8 MB
Efficient Secure Two-Party Protocols: Techniques and Constructions.pdf 2.7 MB
Learning Devise for Rails: Use Devise to make your Rails application accessible, user friendly, and secure.pdf 2.6 MB
Learning SaltStack: Build, manage, and secure your infrastructure by utilizing the power of SaltStack 2nd Edition.pdf 2.6 MB
Global Security: A Vision for the Future: Addressing the Challenges and Opportunities for Research in the Information Age.pdf 2.3 MB
The Secure Online Business Handbook: E-Commerce, IT Functionality & Business Continuity.pdf 1.7 MB
Cyber Warfare Its Implications on National Security.azw3 1.7 MB
Toward a Safer and More Secure Cyberspace.pdf 1.6 MB
Vulnerability, Exploitation and Migrants Insecure Work in a Globalised Economy.pdf 1.5 MB