|
Manico J. Iron-Clad Java. Building Secure Web Applications 2015
5 months, 3 weeks
Files: 1 Total size: 25.3 MB Total requests: 40 Last access time: 21 hours, 27 minutes
|
|
Haro P. Secure APIs. Design, build, and implement 2025
5 months, 3 weeks
Files: 1 Total size: 36.4 MB Total requests: 1988 Last access time: 1 week, 1 day
|
|
[ WebToolTip.com ] Secure Online Voting Using Biometric Authentication and Public Key Encryption
5 months, 4 weeks
Files: 4 Total size: 49.6 MB Total requests: 227 Last access time: 1 week, 1 day
|
Files: 1 Total size: 834.7 KB Total requests: 146 Last access time: 1 hour, 27 minutes
|
Files: 1 Total size: 36.4 MB Total requests: 1021 Last access time: 11 hours, 55 minutes
|
|
Ethical Hacking & Countermeasures - Secure Network Infrastructures - EC-Council.pdf
6 months, 1 week
Files: 1 Total size: 7.9 MB Total requests: 38 Last access time: 3 months
|
Files: 1 Total size: 9.0 MB Total requests: 1221 Last access time: 1 minute
|
Files: 4 Total size: 16.9 MB Total requests: 222 Last access time: 5 hours, 11 minutes
|
Files: 1 Total size: 15.0 MB Total requests: 985 Last access time: 5 hours, 28 minutes
|
|
Shang T. Secure Quantum Network Coding Theory 2020
7 months, 2 weeks
Files: 1 Total size: 7.1 MB Total requests: 136 Last access time: 2 days, 8 hours
|