نتایج جستجو
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Bird, 2017
International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence
Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.), 2018
SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization
Rahamatullah Khondoker (eds.), 2018
The CIS Critical Security Controls for Effective Cyber Defense, Version 6.0
Center for Internet Security, 2015
Security analysis. Part VII, Additional aspects of security analysis ; Discrepancies between price and value
Graham, Benjamin; Buffett, Warren; Klarman, Seth A.; Dodd, David Le Fevre, 2009
Security Analysis, Part VII - Additional Aspects of Security Analysis. Discrepancies Between Price and Value
Benjamin Graham; David L. Dodd, 2009
Speech and Language Disorders in Children: Implications for the Social Security Administration’s Supplemental Security Income Program
Patti Simon, Sara Rosenbaum, 2016
Principles of Computer Security - CompTIA Security+ and Beyond, 2nd Edition
Dr. Wm. Arthur Conklin, Dr. Gregory White, Dwayne Williams, Roger L. Davis, Chuck Cothren, 2010
CompTIA Security+ Guide to Network Security Fundamentals
Mark Ciampa, 2015
Lab Manual for Security+ Guide to Network Security Fundamentals
Andrew Hurd, Dean Farwood, 2015
Security Awareness: Applying Practical Security in Your World
Mark Ciampa, 2017
Wikipedia Handbook of Computer Security and Digital Forensics 2016 : Part I – Computer Security
Reiner Creutzburg, 2016
