|
|
@ -531,6 +531,7 @@ |
|
|
|
* [Intrusion Detection Systems with Snort](http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf) |
|
|
|
* [Intrusion Detection Systems with Snort](http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf) |
|
|
|
* [OWASP Top 10 for .NET Developers](http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html) |
|
|
|
* [OWASP Top 10 for .NET Developers](http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html) |
|
|
|
* [Security Engineering](http://www.cl.cam.ac.uk/~rja14/book.html) |
|
|
|
* [Security Engineering](http://www.cl.cam.ac.uk/~rja14/book.html) |
|
|
|
|
|
|
|
* [CryptoParty Handbook](https://www.cryptoparty.in/documentation/handbook) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#### Software Architecture |
|
|
|
#### Software Architecture |
|
|
|