| Views | Cover | Author | Title | Published | Format | Updated | Thank_to |
1878909 | 46 |  | Jason Albanese, Wes Sonnenreich | Network Security Illustrated | 2003 | PDF | 1/18/2021 6:17:33 AM | gestalt |
1878832 | 14 |  | Plamen Petkov, Dumitru Tsiulyanu, Wilhelm Kulisch | Nanoscience Advances in CBRN Agents Detection, Information and Energy Security | 2015 | PDF | 1/18/2021 5:20:03 AM | gestalt |
1878503 | 27 |  | Giovanni Livraga, Vicenc Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri | Data Privacy Management and Security Assurance: 11th International Workshop | 2016 | PDF | 1/17/2021 12:41:08 PM | alex21s |
1878448 | 112 |  | Chris Sanders | Practical Packet Analysis, 3e | 2017 | PDF | 1/17/2021 11:39:40 AM | alex21s |
1877729 | 67 |  | Preventing Digital Extortion | Preventing Digital Extortion. | 2017 | True PDF | 1/16/2021 12:06:02 PM | alex21s |
1877618 | 45 |  | Ewa Huebner, Stefano Zanero | Open Source Software for Digital Forensics | 2010 | PDF | 1/16/2021 8:47:09 AM | risotor |
1877325 | 109 |  | Handbook Certified Data Protection Officer: Practical Work Plan Guidance (Privacy and Data Protectio | Handbook Certified Data Protection Officer: Practical Work Plan Guidance | 2021 | PDF AZW3 EPUB | 1/15/2021 5:29:57 PM | risotor |
1877320 | 75 |  | Security of Ubiquitous Computing Systems: Selected Topics | Security of Ubiquitous Computing Systems: Selected Topics | 2021 | PDF EPUB | 1/15/2021 5:24:45 PM | risotor |
1877150 | 41 | 2_Practice_1_15_2021_10_33_23_AM.jpg) | Mike Chapple, David Seidl | CISSP Official (ISC)2 Practice Tests | 2016 | PDF | 1/15/2021 10:33:23 AM | topron |
1877139 | 52 |  | Christoph Kern, Anita Kesavan, Neil Daswani | Foundations of Security: What Every Programmer Needs to Know | 2007 | EPUB | 1/15/2021 10:17:09 AM | topron |
|