Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e
Yuri Diogenes
Download - Immediately Available
Format: eBook (PDF)
Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e
Yuri Diogenes
Download - Immediately Available
Format: eBook (EPUB)
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
Mike Chapple
Download - Immediately Available
Format: eBook (PDF)
Open Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Download - Immediately Available
Format: eBook (EPUB)
IKEv2 IPsec Virtual Private Networks : Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
Graham Bartlett
Download - Immediately Available
Format: eBook (PDF)
IKEv2 IPsec Virtual Private Networks : Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
Graham Bartlett
Download - Immediately Available
Format: eBook (EPUB)
Snort 2.1 Intrusion Detection, Second Edition
Brian Caswell
Download - Immediately Available
Format: eBook (PDF)
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment
Julie Mehan
Download - Immediately Available
Format: eBook (PDF)
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment
Julie Mehan
Download - Immediately Available
Format: eBook (EPUB)
Securing IM and P2P Applications for the Enterprise
Marcus Sachs
Download - Immediately Available
Format: eBook (PDF)
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
Mike Chapple
Download - Immediately Available
Format: eBook (EPUB)
Ada and Beyond : Software Policies for the Department of Defense
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Trust and Trustworthy Computing : 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings
Thorsten Holz
Download - Immediately Available
Format: eBook (PDF)
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings
Nathalie Mitton
Download - Immediately Available
Format: eBook (PDF)
Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
Jim Blythe
Download - Immediately Available
Format: eBook (PDF)
Trust, Privacy, and Security in Digital Business : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
Claudia Eckert
Download - Immediately Available
Format: eBook (PDF)
Lightweight Cryptography for Security and Privacy : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
Thomas Eisenbarth
Download - Immediately Available
Format: eBook (PDF)
Trust, Privacy and Security in Digital Business : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings
Simone Fischer-Hubner
Download - Immediately Available
Format: eBook (PDF)
Lightweight Cryptography for Security and Privacy : 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers
Gildas Avoine
Download - Immediately Available
Format: eBook (PDF)
Digital Forensics and Cyber Crime : 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers
Joshua I. James
Download - Immediately Available
Format: eBook (PDF)
Radio Frequency Identification: Security and Privacy Issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
Jaap-Henk Hoepman
Download - Immediately Available
Format: eBook (PDF)