-
121
Securing the perimeter : deploying identity and access management with free open source software /
Published 2018CONNECT
Electronic eBook -
122
-
123
-
124
Network scanning cookbook : practical network security using Nmap and Nessus 7 /
Published 2018CONNECT
Electronic eBook -
125
Building a modern security program : adapting security for DevOps and cloud /
Published 2018CONNECT
Electronic eBook -
126
-
127
-
128
Pro ASP.NET Core Identity : under the hood with authentication and authorization in ASP.NET Core 5 and 6 applications /
Published 2021CONNECT
Electronic eBook -
129
-
130
-
131
Kali Linux : testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie /
Published 2019CONNECT
Electronic eBook -
132
Privileged attack vectors : building effective cyber-defense strategies to protect organizations /
Published 2020CONNECT
Electronic eBook -
133
-
134
-
135
HIPAA Compliance for Healthcare Workloads on IBM Spectrum Scale /
Published 2020CONNECT
Electronic eBook -
136
Protecting Data Privacy Beyond the Trusted System of Record /
Published 2020CONNECT
Electronic eBook -
137
Incident response primer : how to keep from getting pwned too hard /
Published 2019CONNECT
Electronic eBook -
138
Network security : private communication in a public world /
Published 2002CONNECT
Electronic eBook -
139
Implementing NAP and NAC security technologies : the complete guide to network access control /
Published 2008CONNECT
Electronic eBook -
140
Windows Group Policy resource kit : Windows Server 2008 and Windows Vista /
Published 2008CONNECT
Electronic eBook