Amazon purchasing books-Alibaba Cloud Developer Community

http://www.amazon.com/Database-Security-Alfred-Basta/dp/1435453905/ref=sr_1_251? s=books&ie=UTF8&qid=1316328635&sr=1-251

http://www.amazon.com/Governance-International-Security-ISO27991-ISO27002/dp/0749464852/ref=sr_1_27? s=books&ie=UTF8&qid=1316327965&sr=1-27

http://www.amazon.com/CISOs-Guide-Penetration-Testing-Framework/dp/1439880271/ref=sr_1_85? s=books&ie=UTF8&qid=1316328086&sr=1-85

http://www.amazon.com/Coding-Penetration-Testers-Building-Better/dp/1597497290/ref=sr_1_142? s=books&ie=UTF8&qid=1316328276&sr=1-142

http://www.amazon.com/Web-Application-Hackers-Handbook-Discovering/dp/1118026470/ref=sr_1_164? s=books&ie=UTF8&qid=1316328350&sr=1-164

http://www.amazon.com/Expert-Oracle-Java-Security-Applications/dp/1430238313/ref=sr_1_168? s=books&ie=UTF8&qid=1316328350&sr=1-168

http://www.amazon.com/Qualified-Security-Analyst-Penetration-Testing/dp/0763775002/ref=sr_1_174? s=books&ie=UTF8&qid=1316328418&sr=1-174

http://www.amazon.com/Open-Enterprise-Security-Architecture--ESA/dp/9087536720/ref=sr_1_194? s=books&ie=UTF8&qid=1316328459&sr=1-194

http://www.amazon.com/Building-Secure-Software-Addison-Wesley-Professional/dp/0321774957/ref=sr_1_205? s=books&ie=UTF8&qid=1316328539&sr=1-205

http://www.amazon.com/Basics-Hacking-Penetration-Testing-Syngress/dp/1597496553/ref=sr_1_221? s=books&ie=UTF8&qid=1316328569&sr=1-221

http://www.amazon.com/Database-Security-Alfred-Basta/dp/1435453905/ref=sr_1_251? s=books&ie=UTF8&qid=1316328635&sr=1-251

http://www.amazon.com/WordPress-Ultimate-Security-Olly-Connelly/dp/1849512108/ref=sr_1_285? s=books&ie=UTF8&qid=1316328770&sr=1-285

http://www.amazon.com/ISO-27002-Foundation-Complete-Certification/dp/1743044976/ref=sr_1_293? s=books&ie=UTF8&qid=1316328830&sr=1-293

http://www.amazon.com/Security-Risk-Management-Building-Information/dp/1597496154/ref=sr_1_302? s=books&ie=UTF8&qid=1316328858&sr=1-302

http://www.amazon.com/Security-Risk-Assessment-Handbook-Assessments/dp/1439821488/ref=sr_1_312? s=books&ie=UTF8&qid=1316328858&sr=1-312

http://www.amazon.com/Oracle-Database-11g-R2-Encryption/dp/1936930129/ref=sr_1_322? s=books&ie=UTF8&qid=1316328893&sr=1-322

http://www.amazon.com/Risk-Management-Open-Group-Guide/dp/9087536631/ref=sr_1_326? s=books&ie=UTF8&qid=1316328893&sr=1-326

http://www.amazon.com/Digital-Forensics-Open-Source-Tools/dp/1597495867/ref=sr_1_332? s=books&ie=UTF8&qid=1316328944&sr=1-332

http://www.amazon.com/CMS-Security-Handbook-Comprehensive-WordPress/dp/0470916214/ref=sr_1_334? s=books&ie=UTF8&qid=1316328944&sr=1-334

http://www.amazon.com/Practical-Risk-Management-Mark-Scherling/dp/1439856532/ref=sr_1_338? s=books&ie=UTF8&qid=1316328983&sr=1-338

http://www.amazon.com/practical-guide-implementing-maintaining-compliance/dp/1849281866/ref=sr_1_342? s=books&ie=UTF8&qid=1316328983&sr=1-342

http://www.amazon.com/Security-Patch-Management-Felicia-Nicastro/dp/1439824991/ref=sr_1_355? s=books&ie=UTF8&qid=1316329019&sr=1-355

http://www.amazon.com/FISMA-Principles-Best-Practices-Compliance/dp/1420078291/ref=sr_1_358? s=books&ie=UTF8&qid=1316329035&sr=1-358

http://www.amazon.com/Worldwide-Vulnerability-Assessment-Companies-Analysis/dp/B004QYG4CO/ref=sr_1_385? s=books&ie=UTF8&qid=1316329096&sr=1-385

http://www.amazon.com/WebSphere-Application-Server-v7-0-Security/dp/1849681481/ref=sr_1_389? s=books&ie=UTF8&qid=1316329096&sr=1-389

http://www.amazon.com/Auditing-Controls-Protect-Information-Assets/dp/0071742387/ref=sr_1_427? s=books&ie=UTF8&qid=1316329182&sr=1-427

http://www.amazon.com/PCI-V2-0-Documentation-Compliance-Toolkit/dp/184928170X/ref=sr_1_438? s=books&ie=UTF8&qid=1316329217&sr=1-438

http://www.amazon.com/Web-Application-Security-Communications-Information/dp/3642161197/ref=sr_1_454? s=books&ie=UTF8&qid=1316329243&sr=1-454

http://www.amazon.com/gp/search/ref=sr_st? qid=1316327797&rh=n%3A283155%2Cn%3A%211000%2Cn%3A5%2Cn%3A377560011&sort=daterank#/ref=sr_pg_38? rh=n%3A283155%2Cn%3A%211000%2Cn%3A5%2Cn%3A377560011&page=38&sort=daterank&ie=UTF8&qid=1316329217

http://lcamtuf.coredump.cx/tangled/

http://www.amzease.com/search/books/Keyword/Security+Considerations+in+Lotus+Notes+And+Domino+7%3A+Making+Great+Security+Easier+to+Implement+

Selected, One-Stop Store for Enterprise Applications
Support various scenarios to meet companies' needs at different stages of development

Start Building Today with a Free Trial to 50+ Products

Learn and experience the power of Alibaba Cloud.

Sign Up Now