-
-
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories 电子书下载
This report addresses consequences of current and proposed restrictions on international contacts by the U.S. Department of Energ ...
04-10 [ None ]
-
Introduction to Information Security. A Strategic-Based Approach 电子书下载
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear unders ...
06-27 [ None ]
-
Full Stack Python Security - Dennis Byrne 电子书下载
Full Stack Python Security - Dennis ByrneDennis Byrne ...
02-05 [ computer ]
-
The Small Gulf States: Foreign and security policies before and after the Arab Spring 电子书下载
Small states are often believed to have been resigned to the margins of international politics. However, the recent increase in t ...
06-27 [ None ]
-
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings 电子书下载
This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architec ...
09-06 [ None ]
-
Himalayan Glaciers: Climate Change, Water Resources, and Water Security 电子书下载
Scientific evidence shows that most glaciers in South Asia`s Hindu Kush Himalayan region are retreating, but the consequences for ...
06-07 [ None ]
-
Wireless Security Handbook - Aaron E. Earle 电子书下载
Wireless Security Handbook - Aaron E. EarleAaron E. Earle ...
02-05 [ computer ]
-
-
Security as Code - BK Sarthak Das and Virginia Chu 电子书下载
Security as Code - BK Sarthak Das and Virginia ChuBK Sarthak Das and Virginia Chu ...
02-05 [ computer ]
-
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings 电子书下载
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for ...
09-06 [ None ]
-
Spring Security 3.1 电子书下载
«Spring Security 3.1» is an incremental guide that will teach you how to protect your application from malicious users. You will ...
06-27 [ None ]
-
Cloud Native Security Cookbook - Josh Armitage 电子书下载
Cloud Native Security Cookbook - Josh ArmitageJosh Armitage ...
02-05 [ computer ]
-
Sun Certified Security Administrator for Solaris 9 and 10 Study Guide - John Chirillo and Edgar Danielyan 电子书下载
Sun Certified Security Administrator for Solaris 9 and 10 Study Guide - John Chirillo and Edgar DanielyanJohn Chirillo and Edgar Danielyan ...
02-05 [ computer ]
-
End-to-End Network Security Defense-in-Depth - Omar Santos 电子书下载
End-to-End Network Security Defense-in-Depth - Omar SantosOmar Santos ...
02-05 [ computer ]
-
Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide 电子书下载
Spring Security 3.1 ...
06-27 [ None ]
-
Cybersecurity Ops with bash - Paul Troncone and Carl Albing 电子书下载
Cybersecurity Ops with bash - Paul Troncone and Carl AlbingPaul Troncone and Carl Albing ...
02-05 [ computer ]
-
CISCO Official Cert Guide CCNA Security 640-554 - Keith Barker and Scott Morris 电子书下载
CISCO Official Cert Guide CCNA Security 640-554 - Keith Barker and Scott MorrisKeith Barker and Scott Morris ...
02-05 [ computer ]