磁力链接

magnet:?xt=urn:btih:B1251F3440C9A6111165E88A33A781ADB98B5034
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • Cryptography and Network Security: Principles and Practice 6th Edition.pdf 215.0 MB
  • Network Security Assessment: Know Your Network 3rd edition.pdf 143.4 MB
  • Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools.pdf 65.9 MB
  • Developing and Securing the Cloud.pdf 65.4 MB
  • Handbook of Communications Security.pdf 60.4 MB
  • Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance 3rd Edition.pdf 54.2 MB
  • Cisco Next-Generation Security Solutions: All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP.epub 37.1 MB
  • Secure Data Provenance and Inference Control with Semantic Web.pdf 33.1 MB
  • Linux User & Developer: Secure Your System Issue 167 2016.pdf 32.8 MB
  • Exam Ref 70-744 Securing Windows Server 2016.pdf 29.4 MB
  • Mobile Cloud Computing: Models, Implementation, and Security.pdf 28.3 MB
  • Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions.azw3 27.9 MB
  • Counterterrorism and Cybersecurity: Total Information Awareness 2nd Edition.pdf 27.5 MB
  • Electronics for You: What's Being Done to Enhance Security in IoT November 2017.pdf 27.2 MB
  • Architectures and Protocols for Secure Inforamtion Technology Infrastructures.pdf 25.1 MB
  • Mastering OpenVPN: Master building and integrating secure private networks using OpenVPN.pdf 24.2 MB
  • GFI Network Security and PCI Compliance Power Tools.pdf 24.2 MB
  • Analyzing and Securing Social Networks.pdf 21.7 MB
  • Mobile, Secure, and Programmable Networking.pdf 21.5 MB
  • Foundations and Practice of Security.pdf 21.5 MB
  • Protocols for Secure Electronic Commerce 3rd Edition.pdf 21.1 MB
  • Computer Communication, Networking and Internet Security.pdf 19.2 MB
  • The Complete Guide to Physical Security.pdf 17.8 MB
  • iOS Application Security: The Definitive Guide for Hackers and Developers.pdf 17.1 MB
  • Oracle Database Upgrade Migration, & Transformation Tips & Techniques: Best Practices for an Effective, Efficient, and Secure Transition.pdf 17.1 MB
  • VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers.pdf 16.1 MB
  • Data Security in Cloud Computing.pdf 15.5 MB
  • Linux User & Developer: Secure Your System Issue 181 2017.pdf 14.2 MB
  • Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter: Learn how to secure your system and implement QoS using real-world scenarios for entworks of al sizes.pdf 14.1 MB
  • Fundamentals of Secure System Modelling.pdf 13.5 MB
  • (IN)SECURE Magazine RSA Conference 2017.pdf 13.5 MB
  • Learning IOS Penetration Testing: Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests.pdf 12.7 MB
  • Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems 2nd Edition 2nd Edition.pdf 12.5 MB
  • Artificial Immune System: Applications in Computer Security.pdf 11.8 MB
  • Learning Puppet Security: Secure your IT environments with the powerful security tools of Puppet.pdf 11.8 MB
  • Microsoft Azure Security: Protect your solutions from malicious users using Microsoft Azure Services.pdf 11.7 MB
  • (IN)SECURE Magazine Issue 43 What is the Value of Professional Certification.pdf 11.6 MB
  • Prinxiples of Security and Trust 2016.pdf 11.5 MB
  • (IN)SECURE Magazine Issue 54.pdf 11.5 MB
  • CompTIA Security SY0-301 Authorized Cert Guide 2nd Edition.pdf 11.4 MB
  • Security of Networks and Services in an All-Connected World.pdf 10.9 MB
  • CompTIA CSA+ Cybersecurity Analyst Study Guide Exam CS0-001.azw3 10.8 MB
  • Research Methods for Cyber Security.pdf 10.8 MB
  • Digital Privacy and Security Using Windows: A Practical Guide.pdf 10.3 MB
  • Hardware IP Security and Trust.pdf 10.2 MB
  • Cyber Security and IT Infrastructure Protection.pdf 10.1 MB
  • Oracle SOA Suite 11g Administrator's Handbook: Create a reliable, secure, and flexible environment for your Oracle SOA Suite 11g Service Infrastructure and SOA composite applications.pdf 9.8 MB
  • Security Patterns in Practice: Designing Secure Architectures Using Software Patterns.epub 9.7 MB
  • Security and Loss Prevention: An Introduction 6th Edition.pdf 9.7 MB
  • The Home Security Handbook: Expert Advice for Keeping Safe at Home (and Away).epub 9.4 MB
  • Aspect-Oriented Security Hardening of UML Design Models.pdf 9.4 MB
  • iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf 9.2 MB
  • Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud.pdf 9.2 MB
  • SCION: A Secure Internet Architecture.pdf 8.9 MB
  • (IN)SECURE Magazine Issue 49 Privacy by Design: What is and Where to Build It.pdf 8.9 MB
  • Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies.pdf 8.5 MB
  • (IN)SECURE Magazine Issue 41 Privacy in the Cloud: The Power of Encryption.pdf 8.2 MB
  • (IN)SECURE Magazine Issue 48.pdf 8.1 MB
  • Protecting Privacy in Data Release: Advances in Information Security.pdf 8.1 MB
  • How to Break Web Software: Functional and Security Testing of Web Applications and Web Services.pdf 7.9 MB
  • Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security.pdf 7.8 MB
  • Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis.pdf 7.7 MB
  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management.chm 7.6 MB
  • (IN)SECURE Magazine RSA Conference 2015.pdf 7.5 MB
  • Next Generation SSH2: Implementation Securing Data in Motion.pdf 7.5 MB
  • Securing the Internet of Things.pdf 7.4 MB
  • Windows Server 2012 R2: Storage, Security, & Networking Pocket Consultant.pdf 7.2 MB
  • (IN)SECURE Magazine Issue 50.pdf 7.2 MB
  • Software Quality Assurance: Integrating Testing, Security, and Audit.pdf 7.1 MB
  • Complexity, Security and Civil Society in East Asia: Foreign Policies and the Korean Peninsula.pdf 7.0 MB
  • Cyber Security Awareness for CEOs and Management.pdf 7.0 MB
  • Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems.pdf 6.9 MB
  • What Is Computer Science: An Information Security Perspective.pdf 6.5 MB
  • Metrics and Methods for Security Risk Management.pdf 6.5 MB
  • Cloud Management and Security.pdf 6.5 MB
  • (IN)SECURE Magazine Issue 45 Tackling Today's Authentication Complexities.pdf 6.2 MB
  • Networks and Network Analysis for Defence and Security.pdf 6.0 MB
  • (IN)SECURE Magazine RSA Conference 2014.pdf 5.9 MB
  • Case Studies in Secure Computing: Achievements and Trends.pdf 5.9 MB
  • Getting Started with Windows VDI: Create, maintain, and secure scalable and resilient virtual desktops with Windows 8.1 and Windows Server 2012 R2.azw3 5.8 MB
  • Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures.pdf 5.8 MB
  • What Every Engineer Should Know About Cyber Security and Digital Forensics.pdf 5.7 MB
  • Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters.pdf 5.4 MB
  • GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client modules, and Web Services using Java EE and GlassFish security measures.pdf 5.3 MB
  • Patterns and Practices Web Service Security.pdf 5.0 MB
  • Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide.pdf 5.0 MB
  • Security and the Networked Society.pdf 4.9 MB
  • Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information.pdf 4.7 MB
  • Microsoft Dynamics AX 2012 R3 Security: A quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations.pdf 4.6 MB
  • Securing Cloud and Mobility: A Practitioner's Guide.pdf 4.5 MB
  • Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf 4.5 MB
  • Cryptography and Secure Communication.pdf 4.3 MB
  • CompTIA Security+ Get Certified Get Ahead SY0-301 Study Guide.pdf 4.3 MB
  • CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.pdf 4.0 MB
  • Mobile Payment Systems: Secure Network Architectures and Protocols.pdf 3.9 MB
  • Cyberspace: Risks and Benefits for Society, Security and Development.pdf 3.8 MB
  • Building a Web Application with PHP and MariaDB: A Reference Guide - Build fast, secure, and interactive web applications using this comprehensive guide.pdf 3.8 MB
  • Securing Ajax Applications: Ensuring the Safety of the Dynamic Web.pdf 3.7 MB
  • Handbook of SCADA Control Systems Security.pdf 3.4 MB
  • Securing the Cloud: Cloud Computer Security Techniques and Tactics.pdf 3.4 MB
  • Data Mining and Machine Learning in Cybersecurity.pdf 3.3 MB
  • Microsoft Dynamics AX 2012 Security How-To: Secure your Dynamics AX 2012 environment with simple and practical steps.pdf 3.2 MB
  • Information Security and Digital Forensics.pdf 3.0 MB
  • Getting Started with OAuth 2.0: Programming clients for secure web API authorization and authentication.pdf 2.8 MB
  • Efficient Secure Two-Party Protocols: Techniques and Constructions.pdf 2.7 MB
  • Learning Devise for Rails: Use Devise to make your Rails application accessible, user friendly, and secure.pdf 2.6 MB
  • Learning SaltStack: Build, manage, and secure your infrastructure by utilizing the power of SaltStack 2nd Edition.pdf 2.6 MB
  • Global Security: A Vision for the Future: Addressing the Challenges and Opportunities for Research in the Information Age.pdf 2.3 MB
  • The Secure Online Business Handbook: E-Commerce, IT Functionality & Business Continuity.pdf 1.7 MB
  • Cyber Warfare Its Implications on National Security.azw3 1.7 MB
  • Toward a Safer and More Secure Cyberspace.pdf 1.6 MB
  • Vulnerability, Exploitation and Migrants Insecure Work in a Globalised Economy.pdf 1.5 MB
  • Securely Implementing Network Protocols: Detecting and Preventing Logical Flaws.pdf 1.1 MB
  • Bosnian Security after Dayton: New perspectives.pdf 797.7 kB
  • Cyber Security: Everything an Executive Needs to Know.azw3 350.3 kB

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!