Title: Zero Trust and Third-Party Risk: Reduce the Blast Radius, Author: Gregory C. Rasner
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni Pre-Order Now
Title: Wireless Security and Cryptography: Specifications and Implementations, Author: Nicolas Sklavos
Title: Wireless Networks: Multiuser Detection in Cross-Layer Design, Author: Christina Comaniciu
Title: Wireless Network Security, Author: Yang Xiao
Title: Wireless Crime and Forensic Investigation, Author: Gregory Kipper
Title: Wireless Communications Security: Solutions for the Internet of Things, Author: Jyrki T. J. Penttinen
Title: Wireless Communications Security, Author: Hideki Imai
Title: Wireless Ad-Hoc Networks, Author: Timothy Kolaya
Title: WiMAX: Standards and Security, Author: Syed A. Ahson
Title: WiMAX Security and Quality of Service: An End-to-End Perspective, Author: Seok-Yee Tang
Title: Web 3.0: The Next Generation's Internet and Understanding the Concept of the Metaverse, Author: Prabhat Kumar Srivastav
Title: Understanding Intrusion Detection through Visualization, Author: Stefan Axelsson
Title: Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats, Author: Sarah Armstrong-Smith
Title: Ubiquitous and Transparent Security: Challenges and Applications, Author: A. Suresh Kumar
Title: Trusted Recovery and Defensive Information Warfare, Author: Peng Liu
Title: Trusted Platform Modules: Why, when and how to use them, Author: Ariel Segall
Title: Trusted Computing, Author: Chris Mitchell
Title: Trust And Security In Collaborative Computing, Author: Xukai Zou
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke

Pagination Links