-
1
Network security through data analysis : from data to action /
“…Safari Books Online…”
Get full text
Online Book -
2
-
3
-
4
Industrial cybersecurity : efficiently secure critical infrastructure systems /
“…Safari Books Online…”
Get full text
Online Book -
5
Network security through data analysis : from data to action /
“…Safari Books Online…”
Get full text
Online Book -
6
-
7
-
8
Industrial cybersecurity : efficiently secure critical infrastructure systems /
“…Safari Books Online…”
Get full text
Online Book -
9
IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices /
“…Safari Books Online…”
Get full text
Online Book -
10
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /
“…Safari Books Online…”
Get full text
Online Book -
11
Designing an IAM framework with Oracle Identity and access management suite /
“…Safari Books Online…”
Get full text
Online Book -
12
Security for Microsoft Windows system administrators : introduction to key information security concepts /
“…Safari Books Online…”
Get full text
Online Book -
13
Deploying Microsoft Forefront Protection 2010 for Exchange Server /
“…Safari Books Online…”
Get full text
Online Book -
14
Deploying Microsoft Forefront Unified Access Gateway 2010 /
“…Safari Books Online…”
Get full text
Online Book -
15
Deploying Microsoft Forefront Threat Management Gateway 2010 /
“…Safari Books Online…”
Get full text
Online Book -
16
-
17
-
18
Software test attacks to break mobile and embedded devices /
“…Safari Books Online…”
Get full text
Online Book -
19
Security patterns in practice : designing secure architectures using software patterns /
“…Safari Books Online…”
Get full text
Online Book -
20