Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: Zero Trust Architecture, Author: Cindy Green-Ortiz
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni Pre-Order Now
Title: Wireless Security: Know It All, Author: Praphul Chandra
Title: Wireless Security Handbook, Author: Aaron E. Earle
Title: Wireless Security and Cryptography: Specifications and Implementations, Author: Nicolas Sklavos
Title: Wireless Crime and Forensic Investigation, Author: Gregory Kipper
Title: Wireless Communications Security: Solutions for the Internet of Things, Author: Jyrki T. J. Penttinen
Title: WiMAX Security and Quality of Service: An End-to-End Perspective, Author: Seok-Yee Tang
Title: Web Services Security, Author: Mark O'Neill
Explore Series
Title: Web 3.0: The Next Generation's Internet and Understanding the Concept of the Metaverse, Author: Prabhat Kumar Srivastav
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: VPNs Illustrated: Tunnels, VPNs, and IPsec, Author: Jon Snader
Title: VCP6-NV Official Cert Guide (Exam #2V0-641), Author: Elver Sena Sosa
Title: Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools, Author: Abbas Moallem
Title: Ubiquitous and Transparent Security: Challenges and Applications, Author: A. Suresh Kumar
Title: Trustworthy Global Computing: 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers, Author: Martín Abadi
Title: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers, Author: Weili Han
Title: Trusted Computing, Author: Chris Mitchell
Explore Series
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh Pre-Order Now

Pagination Links