نتایج جستجو
Threat Modeling: Designing for Security
Adam Shostack, 2014
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Li Gong, Gary Ellison, Mary Dageforde, 2003
India’s Human Security: Lost Debates, Forgotten People, Intractable Challenges
Jason Miklian; Ashild Kolas, 2013
India’s Human Security: Lost Debates, Forgotten People, Intractable Challenges
Jason Miklian; Ashild Kolas, 2013
Interpreting the management of information systems security
Gurpreet Singh Dhillon, 1995
Open Source Network Security Tools for Beginners
Alienvault, 2017
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Bruce Schneier, 2018
International Water Law and the Quest for Common Security
Bjørn-Oliver Magsig, 2015
Container Orchestration in Security Demanding Environments at the Swedish Police Authority
Christian Abdelmassih, 2018
Annual Review 2018
National Cyber Security Centre, 2018
Annual Review 2017
National Cyber Security Centre, 2017
CompTIA Security+ Certification Study Guide
Glen E. Clarke, 2017
The Practice of Network Security Monitoring. Understanding Incident Detection and Response
Richard Bejtlich, 2013
Container transport security across modes
OECD, 2005
Information Security: Foundations, technologies and applications
Ali Ismail Awad; Michael Fairhurst, 2018
Security best practices for Azure solutions
Microsoft, 2018
The Evolving Role of CISOs and their Importance to the Business : August 2017 : Security Report
Ponemon Institute LLC, 2017
Physical-Layer Security
Matthieu Bloch, Joao Barros, 2011
CompTIA Security+ Certification Practice Exams, Third Edition
Daniel Lachance, Glen E. Clarke, 2017
