pack12.25/Cryptography and Network Security: Principles and Practice 6th Edition.pdf |
205 MB |
pack12.25/(IN)SECURE Magazine Issue 48.pdf |
7.8 MB |
pack12.25/Learning Puppet Security: Secure your IT environments with the powerful security tools of Puppet.pdf |
11.3 MB |
pack12.25/Securing the Internet of Things.pdf |
7 MB |
pack12.25/The Home Security Handbook: Expert Advice for Keeping Safe at Home (and Away).epub |
9 MB |
pack12.25/Linux User & Developer: Secure Your System Issue 167 2016.pdf |
31.3 MB |
pack12.25/Security and the Networked Society.pdf |
4.7 MB |
pack12.25/Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security.pdf |
7.4 MB |
pack12.25/CompTIA Security+ Get Certified Get Ahead SY0-301 Study Guide.pdf |
4.1 MB |
pack12.25/Oracle Database Upgrade Migration, & Transformation Tips & Techniques: Best Practices for an Effective, Efficient, and Secure Transition.pdf |
16.3 MB |
pack12.25/Next Generation SSH2: Implementation Securing Data in Motion.pdf |
7.2 MB |
pack12.25/Efficient Secure Two-Party Protocols: Techniques and Constructions.pdf |
2.6 MB |
pack12.25/Getting Started with Windows VDI: Create, maintain, and secure scalable and resilient virtual desktops with Windows 8.1 and Windows Server 2012 R2.azw3 |
5.6 MB |
pack12.25/Research Methods for Cyber Security.pdf |
10.3 MB |
pack12.25/Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management.chm |
7.2 MB |
pack12.25/(IN)SECURE Magazine Issue 49 Privacy by Design: What is and Where to Build It.pdf |
8.5 MB |
pack12.25/Securing the Cloud: Cloud Computer Security Techniques and Tactics.pdf |
3.3 MB |
pack12.25/Security of Networks and Services in an All-Connected World.pdf |
10.4 MB |
pack12.25/Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures.pdf |
5.6 MB |
pack12.25/Cloud Management and Security.pdf |
6.2 MB |
pack12.25/(IN)SECURE Magazine Issue 43 What is the Value of Professional Certification.pdf |
11.1 MB |
pack12.25/Artificial Immune System: Applications in Computer Security.pdf |
11.3 MB |
pack12.25/Securing Ajax Applications: Ensuring the Safety of the Dynamic Web.pdf |
3.5 MB |
pack12.25/Cyber Security and IT Infrastructure Protection.pdf |
9.6 MB |
pack12.25/SCION: A Secure Internet Architecture.pdf |
8.5 MB |
pack12.25/Learning SaltStack: Build, manage, and secure your infrastructure by utilizing the power of SaltStack 2nd Edition.pdf |
2.4 MB |
pack12.25/Foundations and Practice of Security.pdf |
20.5 MB |
pack12.25/Fundamentals of Secure System Modelling.pdf |
12.9 MB |
pack12.25/Cisco Next-Generation Security Solutions: All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP.epub |
35.4 MB |
pack12.25/Cyberspace: Risks and Benefits for Society, Security and Development.pdf |
3.6 MB |
pack12.25/Cyber Security: Everything an Executive Needs to Know.azw3 |
342 KB |
pack12.25/Network Security Assessment: Know Your Network 3rd edition.pdf |
136.8 MB |
pack12.25/Learning Devise for Rails: Use Devise to make your Rails application accessible, user friendly, and secure.pdf |
2.4 MB |
pack12.25/Data Security in Cloud Computing.pdf |
14.8 MB |
pack12.25/Handbook of SCADA Control Systems Security.pdf |
3.3 MB |
pack12.25/Cryptography and Secure Communication.pdf |
4.1 MB |
pack12.25/Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information.pdf |
4.5 MB |
pack12.25/CompTIA CSA+ Cybersecurity Analyst Study Guide Exam CS0-001.azw3 |
10.3 MB |
pack12.25/Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide.pdf |
4.8 MB |
pack12.25/Security Patterns in Practice: Designing Secure Architectures Using Software Patterns.epub |
9.2 MB |
pack12.25/Building a Web Application with PHP and MariaDB: A Reference Guide - Build fast, secure, and interactive web applications using this comprehensive guide.pdf |
3.6 MB |
pack12.25/(IN)SECURE Magazine RSA Conference 2015.pdf |
7.2 MB |
pack12.25/Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf |
4.3 MB |
pack12.25/Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters.pdf |
5.1 MB |
pack12.25/Learning IOS Penetration Testing: Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests.pdf |
12.1 MB |
pack12.25/Cyber Security Awareness for CEOs and Management.pdf |
6.7 MB |
pack12.25/How to Break Web Software: Functional and Security Testing of Web Applications and Web Services.pdf |
7.6 MB |
pack12.25/iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf |
8.8 MB |
pack12.25/Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools.pdf |
62.9 MB |
pack12.25/Protocols for Secure Electronic Commerce 3rd Edition.pdf |
20.1 MB |
pack12.25/GFI Network Security and PCI Compliance Power Tools.pdf |
23 MB |
pack12.25/Mastering OpenVPN: Master building and integrating secure private networks using OpenVPN.pdf |
23.1 MB |
pack12.25/Getting Started with OAuth 2.0: Programming clients for secure web API authorization and authentication.pdf |
2.6 MB |
pack12.25/Exam Ref 70-744 Securing Windows Server 2016.pdf |
28 MB |
pack12.25/Secure Data Provenance and Inference Control with Semantic Web.pdf |
31.6 MB |
pack12.25/Handbook of Communications Security.pdf |
57.6 MB |
pack12.25/Computer Communication, Networking and Internet Security.pdf |
18.3 MB |
pack12.25/The Secure Online Business Handbook: E-Commerce, IT Functionality & Business Continuity.pdf |
1.6 MB |
pack12.25/Linux User & Developer: Secure Your System Issue 181 2017.pdf |
13.5 MB |
pack12.25/CompTIA Security SY0-301 Authorized Cert Guide 2nd Edition.pdf |
10.9 MB |
pack12.25/Global Security: A Vision for the Future: Addressing the Challenges and Opportunities for Research in the Information Age.pdf |
2.2 MB |
pack12.25/Cyber Warfare Its Implications on National Security.azw3 |
1.6 MB |
pack12.25/Information Security and Digital Forensics.pdf |
2.8 MB |
pack12.25/GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client modules, and Web Services using Java EE and GlassFish security measures.pdf |
5.1 MB |
pack12.25/Software Quality Assurance: Integrating Testing, Security, and Audit.pdf |
6.8 MB |
pack12.25/Electronics for You: What's Being Done to Enhance Security in IoT November 2017.pdf |
26 MB |
pack12.25/Patterns and Practices Web Service Security.pdf |
4.8 MB |
pack12.25/Architectures and Protocols for Secure Inforamtion Technology Infrastructures.pdf |
23.9 MB |
pack12.25/Microsoft Azure Security: Protect your solutions from malicious users using Microsoft Azure Services.pdf |
11.1 MB |
pack12.25/Bosnian Security after Dayton: New perspectives.pdf |
779 KB |
pack12.25/Microsoft Dynamics AX 2012 R3 Security: A quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations.pdf |
4.4 MB |
pack12.25/(IN)SECURE Magazine RSA Conference 2017.pdf |
12.9 MB |
pack12.25/Microsoft Dynamics AX 2012 Security How-To: Secure your Dynamics AX 2012 environment with simple and practical steps.pdf |
3 MB |
pack12.25/Digital Privacy and Security Using Windows: A Practical Guide.pdf |
9.8 MB |
pack12.25/The Complete Guide to Physical Security.pdf |
17 MB |
pack12.25/Windows Server 2012 R2: Storage, Security, & Networking Pocket Consultant.pdf |
6.9 MB |
pack12.25/Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions.azw3 |
26.6 MB |
pack12.25/Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis.pdf |
7.4 MB |
pack12.25/Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter: Learn how to secure your system and implement QoS using real-world scenarios for entworks of al sizes.pdf |
13.4 MB |
pack12.25/Mobile Payment Systems: Secure Network Architectures and Protocols.pdf |
3.7 MB |
pack12.25/VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers.pdf |
15.3 MB |
pack12.25/Analyzing and Securing Social Networks.pdf |
20.7 MB |
pack12.25/Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud.pdf |
8.8 MB |
pack12.25/Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems 2nd Edition 2nd Edition.pdf |
11.9 MB |
pack12.25/What Every Engineer Should Know About Cyber Security and Digital Forensics.pdf |
5.5 MB |
pack12.25/Aspect-Oriented Security Hardening of UML Design Models.pdf |
8.9 MB |
pack12.25/Metrics and Methods for Security Risk Management.pdf |
6.2 MB |
pack12.25/Toward a Safer and More Secure Cyberspace.pdf |
1.6 MB |
pack12.25/iOS Application Security: The Definitive Guide for Hackers and Developers.pdf |
16.3 MB |
pack12.25/Securely Implementing Network Protocols: Detecting and Preventing Logical Flaws.pdf |
1.1 MB |
pack12.25/CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.pdf |
3.8 MB |
pack12.25/Mobile, Secure, and Programmable Networking.pdf |
20.5 MB |
pack12.25/Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems.pdf |
6.5 MB |
pack12.25/(IN)SECURE Magazine RSA Conference 2014.pdf |
5.6 MB |
pack12.25/Vulnerability, Exploitation and Migrants Insecure Work in a Globalised Economy.pdf |
1.4 MB |
pack12.25/What Is Computer Science: An Information Security Perspective.pdf |
6.2 MB |
pack12.25/(IN)SECURE Magazine Issue 54.pdf |
11 MB |
pack12.25/Securing Cloud and Mobility: A Practitioner's Guide.pdf |
4.3 MB |
pack12.25/Prinxiples of Security and Trust 2016.pdf |
11 MB |
pack12.25/Mobile Cloud Computing: Models, Implementation, and Security.pdf |
27 MB |
pack12.25/Counterterrorism and Cybersecurity: Total Information Awareness 2nd Edition.pdf |
26.2 MB |
pack12.25/Networks and Network Analysis for Defence and Security.pdf |
5.7 MB |
pack12.25/Data Mining and Machine Learning in Cybersecurity.pdf |
3.2 MB |
pack12.25/(IN)SECURE Magazine Issue 45 Tackling Today's Authentication Complexities.pdf |
5.9 MB |
pack12.25/Case Studies in Secure Computing: Achievements and Trends.pdf |
5.6 MB |
pack12.25/Hardware IP Security and Trust.pdf |
9.7 MB |
pack12.25/Security and Loss Prevention: An Introduction 6th Edition.pdf |
9.2 MB |
pack12.25/Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies.pdf |
8.1 MB |
pack12.25/Complexity, Security and Civil Society in East Asia: Foreign Policies and the Korean Peninsula.pdf |
6.7 MB |
pack12.25/(IN)SECURE Magazine Issue 41 Privacy in the Cloud: The Power of Encryption.pdf |
7.9 MB |
pack12.25/Developing and Securing the Cloud.pdf |
62.3 MB |
pack12.25/Protecting Privacy in Data Release: Advances in Information Security.pdf |
7.7 MB |
pack12.25/Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance 3rd Edition.pdf |
51.7 MB |
pack12.25/Oracle SOA Suite 11g Administrator's Handbook: Create a reliable, secure, and flexible environment for your Oracle SOA Suite 11g Service Infrastructure and SOA composite applications.pdf |
9.4 MB |
pack12.25/(IN)SECURE Magazine Issue 50.pdf |
6.9 MB |