BOOKS - PROGRAMMING - Core Software Security Security at the Source
Core Software Security Security at the Source - James Ransome and Anmol Misra 2013 PDF CRC Press BOOKS PROGRAMMING
ECO~22 kg CO²

3 TON

Views
8051

Telegram
 
Core Software Security Security at the Source
Author: James Ransome and Anmol Misra
Year: 2013
Format: PDF
File size: 5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Dr.Web Security Space 12.0. Руководство пользователя
The Linebacker (The Portland Protectors-EHM Security #2)
Trust, Security and Privacy for Big Data
Wastrels of Defense: How Congress Sabotages U.S. Security
Wireless Network Security, 2nd Edition
Duty Bound (Blackthorn Security Book 1)
Off-Limits Protector (Agile Security and Rescue, #3)
Digital Image Security: Techniques and Applications
Cyber Security and Policy A Substantive Dialogue
Industrial Security for Strikes, Riots and Disasters,
The Billionaire (The Portland Protectors-EHM Security #3)
Computer Security and Penetration Testing, Second Edition
European Security & Defence 2017-07
Security without Obscurity A Guide to Cryptographic Architectures
From CIA to APT: An Introduction to Cyber Security
Social and Behavioral Research for Homeland Security
Clash Landing (Agile Security and Rescue, #5)
Digital Image Security Techniques and Applications
Secret Enemy (Red Stone Security, #16)
Cryptography and Network Security: Principles and Practice
Cloud Security Concepts, Applications and Practices
Wireless and Mobile Device Security, Second Edition
Handbook of Research on Multimedia Cyber Security
Криптография. Официальное руководство RSA Security
Data Security in Cloud Computing, Volume I
Security for the Digital World Within an Ethical Framework
Computer Security Handbook, 4th Edition
Love and Protect (Elite Force Security, #3)
Terrorism and Homeland Security, 8th Edition
Terrorism and Global Security: The Nuclear Threat
Honor Code (Blackthorn Security Book 2)
Omega Destiny (Alpha Security Company)
Security Officers and Supervisors 150 Things You Should Know
Maximum Security (Harlequin Intrigue #750)
Cyber Security for Next-Generation Computing Technologies
Hampton (Wild Mustang Security Firm, #0.5)
Tracking the Truth (Security Hounds Investigations, 1)
Strengthening the Retirement System Beyond Social Security
Distributed Networks Intelligence, Security, and Applications
Security Analysis: Principles and Techniques [With CDROM]