Title: The SBA on PCP protocol: The SBA on PCP protocol, The Push - Check - Pull, Author: Ray Hermann Angossio Liwa
Title: Cracking the Fortress: Bypassing Modern Authentication Mechanism, Author: Josh Luberisse
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment, Author: Josh Luberisse
Title: Elsevier's Dictionary of Information Security, Author: G. Manoilov
Title: Dictionary of Information Security, Author: Robert Slade