计算机与互联网 第453页

Mastering AWS Security – Second Edition: Strengthen your cloud environment using AWS security features coupled wit...

Privacy and Identity Management. Sharing in a Digital World: 18th IFIP WG 9.2, 9.6/11.7, 11.6 Inteational Summer School,...

Kubeetes Secrets Handbook: Design, implement, and maintain production-grade Kubeetes Secrets management solutions by: Em...

Information Security: 26th Inteational Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedin...

A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program by: Debra Baker (A...

Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces by: Colin Domoney...

Security-Driven Software Development: Lea to analyze and mitigate risks in your software projects by: Aspen Olmsted (Aut...

VBA für Office-Automatisierung und DigitalisierungGerman edition by: Irene Weber (Author) Publisher: Springer Vieweg Pub...

ASP.NET Core 8 and Angular – Sixth Edition: Full-stack web development with ASP.NET Core 8 and Angular by: Valerio...

Azure Arc Systems Management: Goveance and Administration of Multi-cloud and Hybrid IT Estates by: Ramona Maxwell (Autho...