نتایج جستجو
Information Security — the Next Decade: Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec ’95
Jan H. P. Eloff, Sebastiaan H. von Solms (eds.), 1995
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Bird, 2017
The CIS Critical Security Controls for Effective Cyber Defense, Version 6.0
Center for Internet Security, 2015
CompTIA Security+ Guide to Network Security Fundamentals
Mark Ciampa, 2015
Lab Manual for Security+ Guide to Network Security Fundamentals
Andrew Hurd, Dean Farwood, 2015
Security Awareness: Applying Practical Security in Your World
Mark Ciampa, 2017
Cyber Security Incident Management Guide
Centre For Cyber Security Belgium, 2015
Android Security Internals: An In-Depth Guide to Android’s Security Architecture
Nikolay Elenkov, 2014
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram; John Viega, 2009
Android Security Internals: An In-Depth Guide to Android’s Security Architecture
Nikolay Elenkov, 2014
Deviant Security - The Technical Computer Security Practices of Cyber Criminals
Eric Van De Sandt, 2019
On Watch : Profiles from the National Security Agency's Past 40 Years
National Security Agency, 2016
Computer Security Divsion Annual Report 2015
Computer Security Divsion NIST, 2016
Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines
Abhishek Chopra, Mukund Chaudhary, 2020
Offensive Security OSCP
Offensive Security, 2020
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Qing Li; Gregory Clark, 2015
Security from Zero: Practical Security for Busy People
Eric Higgins, 2020
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
