Title: Wireless Security: Know It All, Author: Praphul Chandra
Title: Wireless Security Handbook, Author: Aaron E. Earle
Title: Wireless Security and Cryptography: Specifications and Implementations, Author: Nicolas Sklavos
Title: Wireless Crime and Forensic Investigation, Author: Gregory Kipper
Title: Wireless Communications Security: Solutions for the Internet of Things, Author: Jyrki T. J. Penttinen
Title: WiMAX Security and Quality of Service: An End-to-End Perspective, Author: Seok-Yee Tang
Title: Web Services Security, Author: Mark O'Neill
Explore Series
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Walling Out the Insiders: Controlling Access to Improve Organizational Security, Author: Michael Erbschloe
Title: VPNs Illustrated: Tunnels, VPNs, and IPsec, Author: Jon Snader
Title: VCP6-NV Official Cert Guide (Exam #2V0-641), Author: Elver Sena Sosa
Title: Understanding Cybersecurity: Emerging Governance and Strategy, Author: Gary Schaub
Title: Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools, Author: Abbas Moallem
Title: Trustworthy Global Computing: 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers, Author: Martín Abadi
Title: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers, Author: Weili Han
Title: Trusted Computing, Author: Chris Mitchell
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Threat Forecasting: Leveraging Big Data for Predictive Analysis, Author: John Pirc
Title: Thor's Microsoft Security Bible: A Collection of Practical Security Techniques, Author: Timothy
Title: The Wiley Handbook of Psychology, Technology, and Society, Author: Larry D. Rosen

Pagination Links