-
1
ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guide /
Subjects: “…Firewalls (Computer security)…”
Get full text
Online Book -
2
-
3
Check Point NGX R65 security administration /
Subjects: “…Firewalls (Computer security)…”
Get full text
Online Book -
4
Electromagnetic information leakage and countermeasure technique /
Subjects: “…Computer security.…”
Get full text
Online Book -
5
Cybersécurité et RGPD protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPD /
Subjects: “…Computer security.…”
Get full text
Online Book -
6
Surveillance systems : design, applications and technology /
Subjects: “…Computer security.…”
Get full text
Online Book -
7
-
8
-
9
Absolute beginner's guide to personal firewalls /
Subjects: “…Firewalls (Computer security)…”
Get full text
Online Book -
10
-
11
-
12
Practical cybersecurity architecture : a guide to creating and implementing robust designs for cybersecurity architects.
Subjects: “…Computer security.…”
Get full text
Online Book -
13
-
14
-
15
Ad hoc anonymous signatures : state of the art, challenges and new directions /
Subjects: “…Group signatures (Computer security)…”
Get full text
Online Book -
16
Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance /
Subjects: “…Computer security.…”
Get full text
Online Book -
17
Penetration testing services procurement guide.
Subjects: “…Penetration testing (Computer security)…”
Get full text
Online Book -
18
Procuring penetration testing services.
Subjects: “…Penetration testing (Computer security)…”
Get full text
Online Book -
19
-
20