标签:Security
Virtualization Security : Protecting Virtualized Environments
Virtualization Security : Protecting Virtualized EnvironmentsAuthors:Shackleford...
Cloud Security : A Comprehensive Guide to Secure Cloud Computing
Cloud Security : A Comprehensive Guide to Secure Cloud ComputingAuthors:Krutz, R...
You: For Sale
You: For SaleAuthors:Sumner, StuartGet this book Contact Email:girro@qq.comPubli...
IT Governance : An International Guide to Data Security and ISO27001/ISO27002
IT Governance : An International Guide to Data Security and ISO27001/ISO27002Aut...
Two-Factor Authentication
Two-Factor AuthenticationAuthors:Stanislav, MarkGet this book Contact Email:girr...
Bent Functions : Results and Applications to Cryptography
Bent Functions : Results and Applications to CryptographyAuthors:Tokareva, Natal...
Penetration Testing Services Procurement Guide
Penetration Testing Services Procurement GuideAuthors:CREST,Get this book Contac...
Obbligo di sicurezza e tutela dell'occupazione : Diritto alla salute e responsabilità dell'imprenditore dopo i d.lgss.. 81/2008 E 106/2009
Obbligo di sicurezza e tutela dell'occupazione : Diritto alla salute e responsab...
The German Labor Market Reforms and Post-Unemployment Earnings
The German Labor Market Reforms and Post-Unemployment Earningsby:Engbom, Niklas;...