Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
LAN Switch Security: What Hackers Know About Your Switches - Eric Vyncke and Christopher Paggen
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
CISSP: 4 in 1- Beginners Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods.
Microservices: Quick Book: A practical guide with examples using Spring Boot, Cloud Config, Cloud Bus, Cloud Security, Eureka, Hystrix, Axon with CQRS and Event Sourcing
Microservices: Quick Book: A practical guide with examples using Spring Boot, Cloud Config, Cloud Bus, Cloud Security, Eureka, Hystrix, Axon with CQRS and Event Sourcing
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager