BookDL - 25 new Books | |
- Security and the Networked Society
- Computer and Information Security Handbook, 2nd Edition
- Security and Loss Prevention: An Introduction, 6th Edition
- Managing Cisco Network Security
- Extreme Exploits: Advanced Defenses Against Hardcore Hacks
- Web Applications (Hacking Exposed)
- ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference
- The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks
- Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!
- Network Science and Cybersecurity
- Network Security
- Security and Privacy in Smart Grids
- Automated Security Management
- Security for Wireless Sensor Networks using Identity-Based Cryptography
- Secure and Resilient Software: Requirements, Test Cases, and Testing Methods
- Security for Cloud Storage Systems
- Securing Cloud and Mobility: A Practitioner’s Guide
- Security and Privacy in Mobile Social Networks
- IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing
- Penetration Testing: Setting Up a Test Lab How-to
- Privacy and Security for Cloud Computing
- Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
- Hands-On Oracle Application Express Security: Building Secure Apex Applications
- Pro Spring Security
- Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology)
Security and the Networked Society Posted: 17 Nov 2014 06:24 PM PST This book was posted on BookDL. Download free at Security and the Networked Society. |
Computer and Information Security Handbook, 2nd Edition Posted: 17 Nov 2014 06:21 PM PST This book was posted on BookDL. Download free at Computer and Information Security Handbook, 2nd Edition. |
Security and Loss Prevention: An Introduction, 6th Edition Posted: 17 Nov 2014 06:13 PM PST This book was posted on BookDL. Download free at Security and Loss Prevention: An Introduction, 6th Edition. |
Managing Cisco Network Security Posted: 17 Nov 2014 06:09 PM PST This book was posted on BookDL. Download free at Managing Cisco Network Security. |
Extreme Exploits: Advanced Defenses Against Hardcore Hacks Posted: 17 Nov 2014 06:05 PM PST This book was posted on BookDL. Download free at Extreme Exploits: Advanced Defenses Against Hardcore Hacks. |
Web Applications (Hacking Exposed) Posted: 17 Nov 2014 05:59 PM PST This book was posted on BookDL. Download free at Web Applications (Hacking Exposed). |
Posted: 17 Nov 2014 05:49 PM PST This book was posted on BookDL. Download free at ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference. |
The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks Posted: 17 Nov 2014 05:46 PM PST This book was posted on BookDL. Download free at The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks. |
Posted: 17 Nov 2014 05:41 PM PST This book was posted on BookDL. Download free at Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!. |
Network Science and Cybersecurity Posted: 17 Nov 2014 05:37 PM PST This book was posted on BookDL. Download free at Network Science and Cybersecurity. |
Posted: 17 Nov 2014 05:34 PM PST This book was posted on BookDL. Download free at Network Security. |
Security and Privacy in Smart Grids Posted: 17 Nov 2014 05:30 PM PST This book was posted on BookDL. Download free at Security and Privacy in Smart Grids. |
Posted: 17 Nov 2014 05:27 PM PST This book was posted on BookDL. Download free at Automated Security Management. |
Security for Wireless Sensor Networks using Identity-Based Cryptography Posted: 17 Nov 2014 05:14 PM PST This book was posted on BookDL. Download free at Security for Wireless Sensor Networks using Identity-Based Cryptography. |
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods Posted: 17 Nov 2014 05:11 PM PST This book was posted on BookDL. Download free at Secure and Resilient Software: Requirements, Test Cases, and Testing Methods. |
Security for Cloud Storage Systems Posted: 17 Nov 2014 05:08 PM PST This book was posted on BookDL. Download free at Security for Cloud Storage Systems. |
Securing Cloud and Mobility: A Practitioner’s Guide Posted: 17 Nov 2014 05:05 PM PST This book was posted on BookDL. Download free at Securing Cloud and Mobility: A Practitioner’s Guide. |
Security and Privacy in Mobile Social Networks Posted: 17 Nov 2014 05:03 PM PST This book was posted on BookDL. Download free at Security and Privacy in Mobile Social Networks. |
IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing Posted: 17 Nov 2014 04:59 PM PST This book was posted on BookDL. Download free at IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing. |
Penetration Testing: Setting Up a Test Lab How-to Posted: 17 Nov 2014 04:57 PM PST This book was posted on BookDL. Download free at Penetration Testing: Setting Up a Test Lab How-to. |
Privacy and Security for Cloud Computing Posted: 17 Nov 2014 04:54 PM PST This book was posted on BookDL. Download free at Privacy and Security for Cloud Computing. |
Posted: 17 Nov 2014 04:48 PM PST This book was posted on BookDL. Download free at Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. |
Hands-On Oracle Application Express Security: Building Secure Apex Applications Posted: 17 Nov 2014 04:45 PM PST This book was posted on BookDL. Download free at Hands-On Oracle Application Express Security: Building Secure Apex Applications. |
Posted: 17 Nov 2014 04:13 PM PST This book was posted on BookDL. Download free at Pro Spring Security. |
Posted: 17 Nov 2014 04:10 PM PST This book was posted on BookDL. Download free at Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology). |
You are subscribed to email updates from BookDL To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
Tidak ada komentar:
Posting Komentar