BOOKS - PROGRAMMING - Core Software Security Security at the Source
Core Software Security Security at the Source - James Ransome and Anmol Misra 2013 PDF CRC Press BOOKS PROGRAMMING
ECO~22 kg CO²

3 TON

Views
8054

Telegram
 
Core Software Security Security at the Source
Author: James Ransome and Anmol Misra
Year: 2013
Format: PDF
File size: 5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Operation: Blood Angel (Shepherd Security #12)
National Security Intelligence, 2nd Edition
Operation: Healing Angel (Shepherd Security #9)
Operation: Trusted Angel (Shepherd Security #10)
European Security & Defence 2017-06
Operation: Fallen Angel (Shepherd Security #4)
Ready or Not: Assurance Security Duet Part Two
Evidence of Truth (KnightGuard Security Book 8)
Evidence of Evil (KnightGuard Security Book 7)
Cyber Security A practitioner|s guide
Security Capital: A General Theory of Pacification
Neoliberalism, the Security State, and the Quantification of Reality
Deadly Intentions (Hardy Brothers Security, #1)
Mobile Application Development, Usability, and Security
Intelligence in the National Security Enterprise An Introduction
Zero To Mastery In Information Security And Cyber Laws
Operation: Beach Angel (Shepherd Security #8)
Privacy, Security, and Cyberspace, Revised Edition
Admin Network and Security - Issue 71, 2022
Sworn to Protect (Red Stone Security, #11)
European Security & Defence 2018-01
Securing His Heart (Power Security Book 1)
Operation: Dark Angel (Shepherd Security #3)
Mastering Information Security Compliance Managemen
European Security & Defence 2019-09
Blockchain and Machine Learning for IoT Security
Cloud Security: Concepts, Applications and Practices
Computer Security Fundamentals Fourth Edition
Lethal Game (Red Stone Security, #15)
Cloak of Red (Arrow Tactical Security #3)
Security Analysis: The Classic 1951 Edition
Wireless Mobile Internet Security, 2 edition
The FBI and Religion: Faith and National Security before and after 9 11
Effective Security Management Seventh Edition
Handbook of Image-Based Security Techniques
Security Management in Mobile Cloud Computing
Providing for National Security: A Comparative Analysis
REACT: Book 1 of the Remington Security Series
Truly Mine: A Bodyguard Romance (Carmichael Security)
Losing Control (Guardian Security Book 8)