1. SECURITY OPERATIONS BEST PRACTICES

    SECURITY OPERATIONS BEST PRACTICES

    892

    博客來

  2. NETWORK SECURITY PRINCIPLES AND PRACTICES

    NETWORK SECURITY PRINCIPLES AND PRACTICES

    2,470

    博客來

  3. INFORMATION SECURITY: PRINCIPLES AND PRACTICES

    INFORMATION SECURITY: PRINCIPLES AND PRACTICES

    5,267

    博客來

  4. INFORMATION SECURITY: PRINCIPLES AND PRACTICES

    INFORMATION SECURITY: PRINCIPLES AND PRACTICES

    4,800

    博客來

  5. SOFTWARE SECURITY: CONCEPTS & PRACTICES

    SOFTWARE SECURITY: CONCEPTS & PRACTICES

    6,600

    博客來

  6. ENVIRONMENT AND SECURITY: DISCOURSES AND PRACTICES

    ENVIRONMENT AND SECURITY: DISCOURSES AND PRACTICES

    6,599

    博客來

  7. WEB3 APPLICATIONS SECURITY AND NEW SECURITY LANDSCAPE: THEORIES AND PRACTICES

    WEB3 APPLICATIONS SECURITY AND NEW SECURITY LANDSCAPE: THEORIES AND PRACTICES

    5,999

    博客來

  8. NINE PRACTICES OF THE SUCCESSFUL SECURITY LEADER

    NINE PRACTICES OF THE SUCCESSFUL SECURITY LEADER

    1,497

    博客來

  9. GENERATIVE AI SECURITY: THEORIES AND PRACTICES

    GENERATIVE AI SECURITY: THEORIES AND PRACTICES

    6,599

    博客來

  10. AWS: SECURITY BEST PRACTICES ON AWS

    AWS: SECURITY BEST PRACTICES ON AWS

    2,419

    博客來

  11. ORACLE FORENSICS: ORACLE SECURITY BEST PRACTICES

    ORACLE FORENSICS: ORACLE SECURITY BEST PRACTICES

    3,148

    博客來

  12. HIPAA SECURITY MADE SIMPLE FOR PHYSICIAN PRACTICES

    HIPAA SECURITY MADE SIMPLE FOR PHYSICIAN PRACTICES

    1,881

    博客來

  13. SECURITY LITIGATION: BEST PRACTICES FOR MANAGING AND PREVENTING SECURITY-RELATED LAWSUITS

    SECURITY LITIGATION: BEST PRACTICES FOR MANAGING AND PREVENTING SECURITY-RELATED LAWSUITS

    2,278

    博客來

  14. ENVIRONMENT AND SECURITY: DISCOURSES AND PRACTICES

    ENVIRONMENT AND SECURITY: DISCOURSES AND PRACTICES

    9,750

    博客來

  15. SECURITY COMMUNITY PRACTICES IN THE WESTERN BALKANS

    SECURITY COMMUNITY PRACTICES IN THE WESTERN BALKANS

    2,089

    博客來

  16. THE DEVIANT SECURITY PRACTICES OF CYBER CRIME

    THE DEVIANT SECURITY PRACTICES OF CYBER CRIME

    12,600

    博客來

  17. SECURITY COMMUNITY PRACTICES IN THE WESTERN BALKANS

    SECURITY COMMUNITY PRACTICES IN THE WESTERN BALKANS

    7,425

    博客來

  18. SECURITY POLICIES AND PROCEDURES: PRINCIPLES AND PRACTICES

    SECURITY POLICIES AND PROCEDURES: PRINCIPLES AND PRACTICES

    5,267

    博客來

  19. INFORMATION SECURITY PRACTICES: EMERGING THREATS AND PERSPECTIVES

    INFORMATION SECURITY PRACTICES: EMERGING THREATS AND PERSPECTIVES

    7,799

    博客來

  20. INFORMATION SECURITY BEST PRACTICES: 205 BASIC RULES

    INFORMATION SECURITY BEST PRACTICES: 205 BASIC RULES

    1,670

    博客來