Title: 802.11 Wireless Networks: Security and Analysis / Edition 1, Author: Alan Holt
Title: 802.1X Port-Based Authentication, Author: Edwin Lyle Brown
Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) / Edition 1, Author: Dan Shoemaker
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Access Control Models and Architectures For IoT and Cyber Physical Systems, Author: Maanak Gupta
Title: Access Control Systems: Security, Identity Management and Trust Models / Edition 1, Author: Messaoud Benantar
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic
Title: Advanced Security Technologies in Networking, Author: Borka Jerman Blazie
Title: Advances in Cyber Security: Technology, Operations, and Experiences, Author: D. Frank Hsu
Title: Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium, Author: Bart De Decker
Title: Advances in Secure Computing, Internet Services, and Applications, Author: B.K. Tripathy
Title: AI and Machine Learning for Network and Security Management, Author: Yulei Wu
Title: AI-Enabled Threat Detection and Security Analysis for Industrial IoT, Author: Hadis Karimipour
Title: An Interdisciplinary Approach to Modern Network Security, Author: Sabyasachi Pramanik
Title: Analyzing and Securing Social Networks / Edition 1, Author: Bhavani Thuraisingham
Title: Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence, Author: ElMouatez Billah Karbab
Title: Anti-Virus Tools and Techniques for Computer, Author: W. Timothy Polk
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Artificial Immune System: Applications in Computer Security / Edition 1, Author: Ying Tan

Pagination Links