Hacking
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
Gunnar Liljas, Alexander Zaytsev, Jason Dentler
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
IT Governance Publishing, Andrew Pattison
Paulino Calderon, Gordon Lyon
Paulino Calderon
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
Adolfo Eloy Nascimento
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
Jakub Kowalewski, Marian Kowalewski
Mantavya Gajjar
Rejah Rehim, Manindar Mohan, Grant Ongers
Rishalin Pillay
Ankush Chowdhary, Prashant Kulkarni, Phil Venables