نتایج جستجو
Security Warrior
Cryus Peikari,Anton Chuvakin, January 2004
Data-driven security : analysis, visualization, and dashboards
Jay Jacobs; Bob Rudis, 2014
150 Things You Should Know about Security
Lawrence J. Fennelly, Marianna Perry, 2017
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server
Edward Pollack, 2018
Hacking: The Unlocking of Transparency Security is a myth…
Ashutosh Pratap Singh (Joker), 2020
Practical Linux Security Cookbook
Tajinder Kalsi, 2016
On the Universal Adversary: Security, Capital and 'the Enemies of All Mankind'
Mark Neocleous, 2016
Citizenship on the Margins: State Power, Security and Precariousness in 21st-Century Jamaica
Yonique Campbell, 2019
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
Vasantha Lakshmi, 2019
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats
Mark Dunkerley, Matt Tumbarello, 2020
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
Eric Rzeszut; Daniel Bachrach, 2014
On Eliminating the Danger of a New War and Strengthening the Peace and Security of Nations
Andrey Yanuaryevich Vyshinsky, 1951
The Internet In Everything: Freedom And Security In A World With No Off Switch
Laura DeNardis, 2020
Computer Security Fundamentals Fourth Edition (Pearson IT Cybersecurity Curriculum (ITCC))
Dr. Chuck Easttom, 2019
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
Kaizhe Huang; Pranjal Jumde, 2020
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments. Code
Kaizhe Huang; Pranjal Jumde, 2020
Long-Term Farming Systems Research: Ensuring Food Security in Changing Scenarios
Gurbir Bhullar (editor), Amritbir Riar (editor), 2020
